Computer_Science__Notes_O_Level-31
Computer_Science__Notes_O_Level-31
COMPUTER APPLICATION
his chapter deals with the areas where computers are used, what they used for,
T
how they are used, the advantages and disadvantages of their usage in such areas.
AD Requirements
C
- considerable processor power
- Input devices like:
- Lightpen:Usedtomakealterationso nthescreentothedrawings.Alsoused
to write directly on the screen. Can be used again to select commands.
- Tracker balls: used to draw designs and to select menus
- Mouse: adjust drawings
- Graphicstablet:provideinterfacefordrawingo nthescreen.Italsolinkswith
the light pen.
- Output Devices like:
- Large high resolution screens
- Graph plotters to draw scale and full size and high quality drawings
- High specification graphics cards
- Some systems support stereoscopic drawings where 3-D spectacles can be worn
and the user sees a 3-D image.
Compiled by: Kapondeni T. Cell:0772 245 866 Page1of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Validation and verification of designs against original specification
- Ability to link withComputer-Aided Manufacture(CAM)
- Facility to calculate the mass of the actual object once built
- Facility to calculate the cost of producing the article
- Simulation of designs without the need to build a prototype
- Import and export to allow the exchange of data with other software packages
- Kinematics (i.e. check moving parts in assemblies don’t interfere with each other)
B: Ergonomics: the design and functionality o f the computer environment and
N
includes furniture setup and how it affect human beings, e.g. ventilation, security,
space, noise, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page2of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
a ctions e.g. data goggles track eye movement and respond by sending new video
input.
Areas of use for Virtual Reality (VR)
1. Entertainment:
a) Usedinfilms/televisionasspecialeffectswherethestudioaudiencewear
VR helmets in a space simulation.
b) Also used in computer arcade games like Need for Speed.
2. Marketing
a) Used in virtual tours around houses and hotels, kitchen designs,
ergonomics, etc.
3. Training: Areas o f use include: military training, medical/dental training,
teachingpersonnelhowtouseequipmentandingeneralareaswheretrainingis
dangerous and/or expensive e.g. flight simulators, car driving simulators,
o perating devices under water or in outer space, etc.
4. Design: Design o f chemical and nuclear plants, ergonomic studies (e.g. factory
layouts), helping to develop devices for handicapped people, etc.
B: A hotspot is an area o f a graphics o bject, o r a section o f text, that activatesa
N
function when selected. Hot spots are particularly common in multimedia
applications, where selecting a hot spot can make the application displayapicture,
run a video, or open a new window, etc.
eatures to see on a virtual tour website of a hotel being advertised on the
F
internet
- hot spots on web page to allow user to move around the hotel
- plans and maps integrated to allow user to navigate the hotel
- ability to move from room to room to navigate whole hotel
Compiled by: Kapondeni T. Cell:0772 245 866 Page3of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- I t is possible to do tasks which would normally be impossible (e.g. walking
inside a nuclear reactor, doing a task in outer space, etc.)
- There is a feeling of “being there” which makes the training more realistic
- Allow a number o f very realistic scenarios to be tested o ut e.g. how todeal
with an emergency o n a chemical plant which could be made to be really
realistic.
ROBOTICS
- A robot is a reprogrammable, multifunctional computer controlled device
designedtoperformmultipletasksinindustries,replacinghumanbeings;e.g.for
spray painting, welding, fixing parts of a car, etc.
- Robotics refers to the scienceo fdevelopingandtheuseo fcomputercontrolled
devices to replace human beings in manufacturing.
- Robots can contain embedded processors or be linked to a computer system.
- They are pre-programmed to do a specific task o r “taught” to remember
instructionsfromahumano peratorcarryingo utthetaskmanuallye.g.teachinga
robot to spray a car with paint.
- Robots rely o n processors and sensors. The sensors gather information so that
the robot knows it is the right time to do the task (e.g.isacarinpositiontobe
sprayed, is there an obstruction to prevent the robot doing its task, etc.)
- They are capable o f doingsomepseudo-intelligenttasks(e.g.differentsizedcars
to be painted)
- Robots are mostly used (suitable) in the following areas:
o In very dangerous areas for human beings to work, e.g. fire fighting,
nuclearpowerstations,undergroundmining,chemical,nuclearfactories,deep
in the ocean, in space, etc.
o In areas where heavy items are to be lifted, e.g. for loading containers in
ships, in production lines, etc.
o In areas where the degree of accuracy is of utmost importance, e.g.
manufacturing of computer chips. Thus producing standardised goods.
o Where work is repeatedly executed andboring,liketrafficcontrolatroad
junctions
obots can move from o ne position to another, e.g. when lifting cars into the
R
warehouse and when going for recharging their batteries.
They keep a record o f the distance they have travelled and the angles they have
turned through so that they can return to original position
They can sense (using light sensor) and stop if unwanted object gets on their way.
Compiled by: Kapondeni T. Cell:0772 245 866 Page4of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
heyneedinformationandprogrammingforthemtowork.Informationisprovided
T
by sensors.
ARTIFICIAL INTELLIGENCE
rtificialIntelligence(AI)isthescienceo fdevelopingcomputersystemsthathave
A
theabilitytolearnfromexperienceandmimichumanreasoninginspecificareas,as
Compiled by: Kapondeni T. Cell:0772 245 866 Page5of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
in medical diagnosis, mineral prospecting, etc. Expert systems are a branch o f
Artificial Intelligence
XPERT SYSTEMS
E
These are computersystemsdevelopedtomimichumanreasoningandworkatthe
levelo fanexpertinaparticularfield,e.g.inmedicaldiagnosis.Agoodexampleo fan
expert system is MYCINthatdiagnosebacterialblooddiseaseandthenrecommend
appropriate antibiotic therapy for patients.
Expert systems are used in the following fields:
- o il or minerals prospecting,
- diagnosing a person’s illness,
- Diagnostics (e.g. finding faults in a car engine, etc.),
- tax and financial calculations,
- complex “thinking” tasks such aschess,
- weather forecasting,
- criminology/forensic science,
- career choices,etc
- nowledge Base: a representation o f facts (data) in a particular field (e.g.
K
diseases, symptoms, treatments, etc. as in medical diagnosis)
- Inferenceprocedure(engine):containsreasoningmethodsusedtoarriveata
conclusion using information in the knowledge base. It contains interrogation
technique/questions and answers.
- User interfaces: these enablepeopletoformqueries,provideinformation,and
interact with the system.
- Explanation facilities (system): enable the systems to explain o r justify their
conclusions, and they also enable developers to check o n the o peration o f the
system themselves.
- Rule Base: This is found in the Working Store. It contains inferencerulesand
the inference engine uses these to draw its conclusions.
he system uses a rule base and an inference engine together to simulate human
T
reasoningwhenanalysingaproblemandarrivingataconclusion.Tosimulatehuman
processes it is necessary to have a vast amount o f information stored in the
knowledge base and the reasoning set out as a set of rules in the rule base.
Compiled by: Kapondeni T. Cell:0772 245 866 Page6of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- esign the knowledge base.
D
- Input data into knowledge base.
- Design the rule base.
- Design inference engine
- Design display of results
- Design appropriate user interface
Compiled by: Kapondeni T. Cell:0772 245 866 Page7of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ineral deposits thatcanbefoundinthatarea.Aninteractiveuserscreenappears.
m
Questionsareaskedaboutgeologicalprofiles.Answerstoquestionsaretypedin.The
inference engine searches the knowledge base using the rule base.
Inputs
Geological data such as rock and soil type
Processing
Draws conclusions from rules and facts using geological data entered and the
mineral data stored in the knowledge base. E.g
- suggest the probability of finding oil as an output
- indicates the probable depth of deposits
- predicts geological deposits above the soil
- produces contour maps showing concentration of minerals, rocks, etc
Output
- Possible mineral deposits that can be found in that area
- Geological maps
DATA LOGGING
he process o f automatically collecting data from source at set intervals, over a
T
periodo ftime,foruseatalaterstage.Adevicethatautomaticallycollectsdatafrom
source at set intervals for use at a later stage is called adata logger.
Compiled by: Kapondeni T. Cell:0772 245 866 Page8of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Acoustic sensor istening to foot steps (in burglar alarms), sound from
L
broken glass, etc
pH sensor Measurestheacidityo ralkalinityo fo bjectse.g.o fsoiland
water, in pollution monitoring, chemical process control,
etc
Humidity(moisture) Measures humidity (moisture) levels in air, greenhouses,
sensor irrigation systems, etc
Distance sensor Measure the distance from one point to another
(could be proximity)
Oxygen sensor Used to monitor pollution levels
T
● hey can be connected to small keyboards or other special reading devices.
● TheyareconnectedtoanAnaloguetoDigitalConverter(ADC),whichconverts
data signals incontinuouslyvaryingform(analogue)collectedbysensorsinto
discrete (digital) values that can be accepted by the computer.
Compiled by: Kapondeni T. Cell:0772 245 866 Page9of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Compiled by: Kapondeni T. Cell:0772 245 866 Page10of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- M onitoring scientific experiments in laboratories
- A burglar alarm system
- Environmental monitoring (oxygen or pollution level in river)
- S ensors read data from the river (Oxygen level, acidity level, using the pH
sensor)
- Data from sensors is converted to digital form
- Computer stores received data
- Oxygenandaciditylevelsfromsensorsarecomparedwithhistoricallystored
(pre-set values/parameters)
- Either data can be transferred to CD/DVD/Memory stick for later analysis OR
- Dataissendtothemonitoringstationdirectlythroughmobilephonenetwork
o r through cables.
- Redcolourisdisplayedo nscreenifvaluesareo utsideacceptablelevelo ran
alarm is sound.
hese systems are designed to monitor critically ill patients o r premature babies.
T
Somebiosensorsconnectedtothecomputerareattachedtothepatientfortracking
and recording vital signs such as heart beat,bloodpressureandbrainactivity.The
biosensors will transmit readings to the central computer should the situation go
beyond a critical warning level and:
- issue a warning on the computer display for nurses on standby
- sound a warning siren, beep or sound to alert medical staff
- flash a light to draw attention of medical staff
atientsinintensivecarearemonitoredthroughsensors.Thesensorsmeasureand
P
give feedback pertaining to: blood pressure, temperature level, weight, pulse rate, etc.
The computer is pre-set with normal range o f values. It compares these with
feedback from sensors.
Compiled by: Kapondeni T. Cell:0772 245 866 Page11of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
omputers record patients’ medical data over some time for later analysis. Data
C
recorded includes:
- Takingmeasurementso npatients,forinstance:bloodpressure,temperature
level, weight, pulse rate etc. This relieves nurses o f some duties that will be
boring, making them faster and more reliable.
- There are however some hospital tasks that are more suitable for human
beings to perform than computers. These include dressing patients, bathing
patients, etc.
ONTROL SYSTEM
C
- It is asysteminwhicho neo rmorecomputersareusedtomonitorandregulate
the operations of non-computer equipment like in oil refineries.
- Controlsystemsinvolvemonitoringandloggingo fphysicalquantities,providean
analysis of performance and allows some user interaction.
- Feedback is an essential element as well as timing.
- Most control systems are real-time systems, e.g. in o il refining, chemical
processing, traffic lights (controlling the sequence o f lights to maintaino ptimum
traffic flow), chemical and nuclear plants (opening and closing valves, safety
systems, etc.), etc.
- In computer control:
✔ computer system takes information from the sensors
Compiled by: Kapondeni T. Cell:0772 245 866 Page12of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
✔
c ompares the data with stored values
✔ Takes action to try to get values within acceptable ranges bysending
signalstodevicestoo pen/close,o n/offetc.Devicesthatreceivesignals
include valves, motors, windows, tapes, etc.
✔ o utput from system can affect next input (feedback)
Compiled by: Kapondeni T. Cell:0772 245 866 Page13of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
onsider the following situation:
C
A chemical process o nly works if temperature is above 70oC and less than 100oC
,
and the pH (acidity) level is between 3.5 and 8.5. The heater is used to warm the
reactorandvalvesareusedtoaddacidwhennecessarytomaintaintheacidity.The
following is a description of how the sensors and the computer in this system works:
- Temperatureandc hemical sensorsread data from thechemical process
- Data from these sensors isconverted to digital formusing ADC
- Computer compares values from sensors with pre-set data in computer
memory
■ If temperature is too low, a signal is send to switch on heaters
■ If temperature is too high, a signal is send to switch off heaters
■ If temperature is within acceptable range, no action is taken
■ If pH is too high, signal is send to open valve and acid is added
■ If pH is too low, signal is send to close valve
■ If pH is within acceptable levels, no action is taken
■ Signals are changed from digital to analogue so as tocontrolheaters
and valves
- This continues as long as the computer is activated.
Control in Greenhouses
- T he environment must be kept constant if plants are to grow successfully in
greenhouses.
- Temperature and humidity in the air needs to be controlled so that it is kept
constant
- Sensors are used to record humidity and temperature levels in analogue form.
The analogue signals are sent to the computer
- The computer willhavestored(pre-set)valueso fminimumacceptableleveland
maximum acceptable level for both temperature and humidity
- If the sensor records humidity level below the minimum acceptable level, the
computerwillsendsignaltotheactuatortoclosethewindowsandswitcho nthe
pumpforacertainperiodo ftime,whichwillspraywaterasafinemistinsidethe
greenhouse.
- Too much humidity will cause the processor to send signals to the actuator to
o pen windows to assist ventilation and drying out air.
- In case o f temperature, if the greenhouse becomes too hot, the windows are
o pened and heater turned o ff. If it becomes too cold, windows are closed and
heater switched on.
I nputs:
Humidity/moisture (collected from humidity/moisture sensor),
Temperature (all in analogue form; collected from temperature sensor)
Processing:
- detecting temperature/humidity level
- Processorscomparespre-setvaluesinthecomputerwithdatacollectedfrom
sensors
- Processor instructs actuator to take action if values exceed o r are lessthan
minimum/maximum pre-set values
Outputs:
- Windows open or closed (digital form)
- Heater on or off (digital)
- Pump for water supply on or off (digital)
Compiled by: Kapondeni T. Cell:0772 245 866 Page14of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
I n c aseofanemergency,thecomputerisedtrafficsystemmayperformanyone
of the following:
- Give uninterrupted path through the system of linked traffic lights.
- Give green link – wave for all traffic to pass.
- Turn all lights to red.
- Activate emergency generator.
- Sound an alarm.
Microprocessor-Controlled Streetlights
Input:
- Pre-set values of Sunset time and Sunrise time
- Light level (Lightsensorsendsmeasuremento flighttomicroprocessor,ADC
converts this to digital)
Processing:
- Processor compares sunrise time, sunset time and current time.
- Ifsunrisetime=currenttimeo rhigher,theprocessorsendsignaltoactuator
so that it switches off lights, else,
- if signal equals sun set time, the processor send signaltoactuatorsothatit
switches on light.
- Also the amount o f light is compared with pre-set value. Ifhigher–nothing
happens, If lower o r equal sends signal to send signal to actuator so thatit
switches on the streetlights.
Output:
Lights switched on or off
Compiled by: Kapondeni T. Cell:0772 245 866 Page15of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- I t is safer to use computer control than human beings, e.g. in monitoring
temperature in a blast furnace, monitoring radiation level in a nuclear reactor,
etc.
- Itisfastertorespondtoproblemsthatmayaffectthesystem,e.g.nuclearreactor
can automatically shut down in response to earthquake
- They don’t get tired, thus computers can work 24/7
- Computersystemsdonotmisskeydatathatmustbeenteredintothesystemas
humans do.
- Computer control is more reliable than human beings as computer does not
forget to take readings
- computers are more accurate and can take more frequent readings (e.g. if
readingsneedtobetakenevery30seconds,humanscanmakemistakeso rmiss
readings or even find it impossible to take readings at such short time intervals)
- datacanbeautomaticallydisplayedandanalysedwithouttheneedtoenterdata
manually (which in itself could introduce errors into the system)
- Data can be automatically stored and used in other programs.
- Theresultso fthesystemcanbeautomaticallystoredinaspread-sheetpackage
o r a database package for future reference.
- Computer’s response time is faster, which is important especially in patient
monitoring
UTOMATED SYSTEMS
A
- These are control systems that are dedicated to o neparticulartaskandlackthe
ability to collect and analyse data as in digital cameras.
- They donotallowforo racto nuserinteraction,e.g.washingmachines,cameras,
watches.
- Most control systems have embedded computers systems inside them.
B: Embedded Computers:–
N
- Refers to use o f microprocessors in non-computer equipment like in cameras,
washing machines, watches, etc. They do not have mouse, monitor and keyboards.
- Thesearenormallydedicatedforaspecifictasktheyaredesignedfor.Embedded
computers are also found in household items like camera, microwave, washing
machine, videorecorder,fridge,sewingmachine,airconditioning,electronictoys,
rice cooker dish washer, Televisions, alarms, clock, radio, DVD players, etc.
Refrigerators
Compiled by: Kapondeni T. Cell:0772 245 866 Page16of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Inputs:
- temperature level (from temperature sensor/ o r entered manually through
the number pad),
- Pressure (from pressure sensor/contact switch/push switch) ,
- push switch setting
Processing:
- Analogue data from sensors is converted to digital by the ADC
- Processor controls temperature level by comparing with pre-set values.
- If temperature is higher than pre-set value, the processor sends signal to
motor to switch on compressor
- If not higher, the compressor is switched off by the actuator
- Processor controls the display panel.
- Processorsendssignalstodisplaypanelandtothemotortoswitchlightso n
o r off.
Outputs
- Switch on lights if door is opened and off when closed
- Light emitting diodes indicating current temperature o f the inside o f
refrigerator.
- A warning buzzer (sound) if light is left open.
- Cold temperature
Air Conditioners
Inputs:
- Pre-set temperature level
- Temperature from temperature sensors
- Pressure from pressure sensors: monitors pressure of refrigerant
Processing
- Processor controls temperature.
- Processor sends signal to motor to change fan speed
- Iftemperatureisbelowpre-setvalue,theprocessorgivesmotorsignalsothat
it switches off fans
- Iftemperatureisabovepre-setvalue,theprocessorgivesmotorsignalsothat
it switches on fans
- Processor controls timing and the display panel
Output
- Cool temperatures in the room
- Fans switched off or on depending on the situation
Digital Camera:
Input:
- Light mode( night or day mode)
- Film speed
- Colour setting
Processing:
- Processor sends signal to automatically adjust film speed,
- Processor positions the end of film,
- Processor sends signal to adjust distance from object,
- Processor sends signal to adjusts light.
- Processor sends signal to save image on the memory card
Output
- Sound to indicate that the film/picture has been taken
Compiled by: Kapondeni T. Cell:0772 245 866 Page17of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- I mage/film captured and stored
- Light flashed to indicate film/picture is taken
Speed Cameras
heseareusedo nroadstotakephotographso fcarswhichhaveexceededthespeed
T
limit. Some o f these cameras use microprocessor controlled chips to store
information.
The advantages of speed c ameras with microprocessor controlled c hips are
that:
- Data and images can be transferred automatically which will be faster.
- Image can be viewed straight away.
- Can store considerably more data and photos.
- Can store other information (apart from photo image) e.g. road conditions.
- Chips can be re-used.
Inputs
- Maximum speed (speed limits)
- Road condition
rocessing:
P
Tasks which would be c arried out by the microprocessor as a speeding c ar
approaches a camera include:
- Sense and record speed of vehicle.
- Compare speed o f vehicle with stored value(s) and decide whether
photograph should be taken.
- Check on value of light intensity.
- Adjust focal length, focus image, adjust shutter speed and set exposure.
Tasks which would be c arriedoutbythemicroprocessorasthephotographis
being taken include:
- Log the time.
- Log the date.
- Log the speed.
- Record the road conditions.
- Operate ―flash.
- Operate shutter.
- Instructs storage of the image.
- Check on value of light intensity.
- Adjust focal length and focus image.
Outputs
- Video/pictures of cars captured
- Alarms of over-speeding cars
Microwave Cookers
unction by switching a microwave unit on for a sufficient time to either defreeze
F
frozenfoodo rcookit.Itisusedtocookfoodquicklybyusingwaves(similartoradio
waves) to heat the food.
Inputs:
Modern cookers have sensors attached to a microprocessor for detecting as inputs:
Weight of food
Temperature of food
Some cookers will also have additional sensors for detecting:
- Amount of steam produced during cooking
Compiled by: Kapondeni T. Cell:0772 245 866 Page18of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Amount of alcohol produced
Processing:
- Themicroprocessorcontinuallymonitorssensorreadingsandbyreferringto
a programmed in-built database of food types.
- The microprocessor determinestimeneeded to cooko r defreeze food.
- IF a temperature in thefoodindicatesthefoodiscookedORthetimeseto n
the oven clock is reached THEN microwaves are not produced
Output: Heat for cooking, Light indicating that food is cooked, power turned o ffif
food is cooked.
eedback: The process in which o utput o f a system can affect its owno utput.Itis
F
wherebyparto ftheo utputo fasystemisreturnedtoitsinputino rdertoregulateits
further output.
3-D Models can be built using CAD, e.g for planning stores.
Advantages of modeling
Compiled by: Kapondeni T. Cell:0772 245 866 Page19of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- o equipment is damaged
N
- People are not put in any danger
- Expensive prototypes don't need to be built
- Time can be sped up or slowed down
- Models can be run and re-run over and over
- Modifications can easily be made and re-tested quickly
Disadvantages of Modeling
- The results depend o nhowgoodthemodelisandhowmuchdatawasused
to create it in the first place.
- Models and simulations can't ever completely re-create real-life situations.
- Not every possible situation may have been included in the model.
- The equipment and software are expensive to purchase.
- Staff need to be trained how to use the software and equipment.
SIMULATION
I n simulation, past and present data, as well as models are analysed in o rder to
predict the future. Simulation is used in the following areas:
- Training (e.g. pilots, drivers, medical doctors, etc.)
- running/testing chemical plants and nuclear plants
- trying out equipment to be used under sea or in outer space
- crash testing cars
- financial simulations (e.g. stock market predictions based o n various
scenarios)
- populationgrowth(i.e.predicthowtheworld’spopulationwillincreasebased
o n a number of different scenarios)
- queues (e.g. simulating queues at supermarket checkouts)
- weather forecasting
Advantages of simulation
- saves cost (rather than doing the real thing)
- safer (scenarios tried out on the simulation first before used in reality)
- possible to try out various scenarios in advance
- Some environments make simulations the o nly way to carry o ut a task
beforehand(e.g.o uterspace,undersea,chemicalprocesses,nuclearreactors,
etc.)
- faster (no need to build and test real system, so it is possible to get results
more quickly)
FLIGHT SIMULATOR
- F light simulators are used to train pilots how to fly aircraft.
- They can also be used totestnewaircraftbeforetheyareactuallyflownfor
the first time.
- Flight simulators are expensive to buy but are much cheaper than actual
aircraft.
A landing simulation with ice o n the runway, thick fog and o nly o ne o f the four
engines working would really test the pilot’s ability
Compiled by: Kapondeni T. Cell:0772 245 866 Page20of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
light simulators enable pilots to experience turbulence, snowstorms,
F
thunderstorms, fog, etc, without leaving the ground.
ow data is gathered
H
Tomakethisasrealisticaspossible,dataneedstobegatheredoveralongperiodo f
time. This can be done by sensorsin/neartheroad,usingcameraso rmanualdata
collection. Data gathered includes:
- number of vehicles passing in all directions at each junction
- number o f vehicles passing in all directions at each junction at a particular
time of the day
- Number of cars build up at a junction before lights change
- is it a week day or weekend or public holiday
- how long it takes to clear vehicles at a junction
- o ther data (e.g. pedestrian crossings)
- time taken for largest/slowest vehicle to pass through a junction
- o ther factors (e.g. filtering of traffic to the right or left)
ow simulation is done
H
The data is entered into the computer and the simulation is run. The following
scenarios may be tried out:
- timing of lights is varied to see how the traffic flow is affected
- buildupnumbero fvehiclesstoppedatajunctionandchangetimingo flights
to see how it affects the traffic flow
- increase/decrease traffic flow in all directions to see how the traffic is affected
- try out the impact of accidents
- consider passage of emergency vehicles
- effect of adding in pedestrian crossings
- o ncethesimulationisrun,thetimingo fthelightsisdeterminedandhowthey
interact so that the maximum traffic flow is achieved;
- fault scenarios (e.g. an accident) and their impact are considered
Compiled by: Kapondeni T. Cell:0772 245 866 Page21of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- S ensors in/near the road gather data (these can be light/infra-red sensors,
induction loops, pressure sensors, etc.)
- the data is usually number of vehicles passing a particular point
- the data is sent to a control box or computer system
- thegathereddataiscomparedtodatastoredinthesystem(thestoreddatais
based o n simulation runs, how the number o f vehicles at a junction at a
particular time of day affects the traffic flow, etc.)
- the control box o r computer “decides” what course o f action to take and
sends signals to the traffic lights to change timing if necessary
- as with any system involving sensors, ADC and DAC interfaces may be needed
Compiled by: Kapondeni T. Cell:0772 245 866 Page22of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- m odel is able to change parameters to see how future climate can be affected
- thereisneedtoreviewaloto fpreviousdataoveranumbero fyearstocheck
ifchangesaregenuine,forexample20years,predictionscomparedtoactual
climate conditions to validate/further refine the model
- can make use o f spread sheets and statistical software packages for o ther
calculations
Output:
- Information o btained is displayed o n the computer screen ready for
presentation on televisions
- Information can be printed documents.
- Tables and graphs are produced
- Rainfall maps and isobars are produced.
- Expected minimum and maximum temperatures are produced
- Areaso fpressurechangewithtimesoitispossibletopredictrainfall,strong
winds, etc. in advance
- Showhowthecloudspatternswillchangewithtimesoitispossibletopredict
rainfall
Compiled by: Kapondeni T. Cell:0772 245 866 Page23of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- T he user needs to be authorised to do this and can control a device anywhere
using a web browser (e.g. from a computer o r even a mobile phone which is
web-enabled).
- Example: An oven contains an embedded processor. The owner can use a web
ready mobile phone anywhere to control the oven remotely.
- By accessing a web site one is able to send instructions to control the oven.
- It is possible to control any device in this way if it contains an embedded
processor e.g. television, DVD player/recorder, washing machine, scientific
experiments in remote areas such as outer space
- G PS systems are used to determine the exact location o f a car, airplane, shipo r
any form of transport which travels from one place to another.
- In vehicles these systems are called Satellite Navigation Systems (sat nav).
- Satellites in outer space transmit signals to the Earth.
- Computers in vehicles (e.g. car, airplane o r ship) receive and interpret these
signals.
- Positioning dependso nveryaccuratetiming–atomicclocksareusedbecauseo f
their accuracy to within a fraction of a second per day.
- Each satellite transmits data indicating its position and time.
- Thecomputerinthevehiclecalculatesitslocationbasedo ntheinformationfrom
at least three satellites as shown below:
Compiled by: Kapondeni T. Cell:0772 245 866 Page24of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- T
he vehicle’s exact location, based o n satellite positioning, can be shown o n the
map; the driver can then be given verbal directions e.g. “turn left into Josiah
Tongogara Road”ORa screen output showing the vehiclemoving on the map
dvantages
A
- It is far safer since a driver o f a vehicle doesn’t have to consult maps whilst
driving.
- it also removes error (e.g. going the wrong way down a one-way street).
- Sat nav systems can also give additional information such as position o f speed
cameras, estimate time of arrival, etc.
- GPS can monitor a vehicle’s position if it has broken down o r has been stolen
(vehicle tracking system).
- In airplanes GPS can pinpoint its exact location in case o f an accident which
enables search teams to quickly respond to the incident.
isadvantages
D
- mapsmaynotuptodatethereforeinstructedtoturnintoaroadwhichnolonger
exists
- road closures due to accidents o r road works may cause problems to a satnav
system
- signal loss can cause problems with GPS systems
- potential interferences from external sources (major problem on aircraft)
- incorrect start and end point entered into system can cause problems
Compiled by: Kapondeni T. Cell:0772 245 866 Page25of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
THE INTERNET
I nternet stands for INTERnational NETwork and it is a global (world-wide)
connection o f computer networks for information sharing. On the internet, o ne is
able to access data stored o n a server in any part o f the world as long as it is
connected to the internet itself. The internet can be accessed from anywhere. It is
also available to anyone. No o ne controls the internet as computers in different
countriesareconnectedyetthecountrieshavedifferentlaws.However,eachcountry
may regulate internet usage in its own territory.
efinition of Terms
D
InformationSuperhighway(ISH):Aglobalnetworko fcomputersformovinghuge
amountso finformationviasatelliteandcableconnection.Informationfoundo nISH
includes homeshopping,entertainment,news,softwaredownloadsandhelp,o nline
banking, stock market dealing, jobs, (vacancies), university placements, etc.
Information Technology(IT):-Theuseo fcomputersininformationhandlingand
communication.
Information Age: A period beginning in the last quartero fthe20thcenturywhen
information became easily accessible through publications and through the
manipulation of information by computers and computer networks.
Global Village: the use o f the internet to access information from any part o f the
world.
Information and Communication Technology (ICT): The use o f computers and
related method as a tool for information communication, for instance through
e-mails, cell phones, etc.
Web page: an HTML document o r page o n the internet that contains information
about an organisation.
Website:-acollectiono fHTMLdocumentsatthesamedomain,o ftenwithacommon
nameandmaintainedandprovideinformationo fasingleo rganisationandisfound
o n the internet.ItisanHTMLpage/pageso ntheinternetthatcontainsinformation
about an organisation
Hyperlink :- an area o f a web page, usually text o r image, that contains a links to
another web page. It is usually underlined o r hasadifferentcolourtoshowthatit
can link the user to another site.
Home page: A web page that loads first (by default) when o ne logs o n to the
internet.Itthenprovideslinkstoo thersiteso ntheinternet.Itisalsoawebpagethat
appears first when you log on to a website.
RL: Uniform Resource Locator: This is a unique address that identifies a
U
website/page o n the internet, e.g. http://www.econet.co.zw. This o nly identifies o ne
(unique)webpageforEconetWirelesswhichisfoundinZimbabwe(.zw).ThusaURL
is a unique address for each web page. A typical URL looks like:
http://www.google.co.zw/computing/student.html.
Compiled by: Kapondeni T. Cell:0772 245 866 Page26of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- " http" (HyperText Transfer Protocol) and a domain name (such as ."co.uk").
Other domain names are as follows:
Compiled by: Kapondeni T. Cell:0772 245 866 Page27of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ebsite features
W
The following are the general features of a good website
- shopping basket
- o ffer security when using credit/debit cards
- search facility for artist, tile, item, etc
- drop down boxes to choose categories
- help facilities
- currency converters for international customers
- date/sales confirmation by automatic email
- saved customer details/customised pages
- ability to track status of orders
- ability to listen to/view/see video/see product, etc
- recognise customer as soon as they log on
- buttons to navigate to other web pages
hendesigningwebpagesitisnecessarytosupplythecorrectspacingforcustomer
W
information(and/orusedropdownmenus),buttonstonavigatetoo therwebpages,
etc
( c)Networkoperatingsystem:managesthenetworkando fferssecuritytointernet
users.
B: internet account: a unique personal identifier given by the Internet Service
N
Provider(ISP).AnISPisano rganisationthatlinksuserstotheinternet,forexample,
Mweb, Ecoweb, Africaonline, Yahoo, Google Inc, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page28of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Searching information from the internet
- Search Engines: These are programs used to search data, information and
o ther websites fromtheinternet,e.g.Google,Yahoo,etc.however,itrequires
good skill from the user to efficiently use search engines in searching data
from the internet.
- Hits: these are many irrelevant (unwanted) results that canbedisplayedby
the search engine if the search engine is not used efficiently.
- Toavoidhitswhenasearchconditionisentered,inclusiono fstatementssuch
as AND (+) and OR will help narrow down the search. E.g.ZIMSEC+syllabus.
ecurity
S Solutions / safeguards
Problem
Hacking - Use of passwords and (usernames) ids to prevent illegal access to files.
- Locking the computer itself or locking the computer room.
- Encryption stops the information from being read even if access has
been gained to a file but won’t stop hacking!!
- Installing firewalls
Viruses - Use ant-virus software like AVG, Avast, Esat NOD32, etc,
- Use firewalls to prevent viruses from entering a computer.
- Do not open emails/attachments from “unknown” sources;
- Only load software from disks/CDs which are originals
Corruption/Loss of Data due to the following ways:
- viruses Prevention of viruses is as given above
- hackers - Prevention of hackers is as given above
Compiled by: Kapondeni T. Cell:0772 245 866 Page29of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
irus: A computer virus is a program which replicates itself, damages o r corrupts
V
files and memory o f the computer, for example, the LoveBugviruswhichattacked
computers in 2000.
Anti-Virus: These are programs that detect and remove (clean) computer viruses
and reduce the risk o f computers being attacked by viruses, e.g. Norton Antivirus,
MacAfee, Avira, Avast, AVG, etc.
Encryption: data encryption is the scrambling o f data before sending, forsecurity
reasons, so that it is not readable unless it is decrypted using. However, some
government do not allow encryption in theircountriesforsecurityreasonsagainst
terrorism.
Back-up file: A duplicate (copy) o f the o riginal file that is created and stored at
different location with the original file, for security reason.
Grandfather-Father-Son files:Alsocalledfilegenerations:thesearethreeversions
o ffilesthatarekeptatano rganisationandarecreatedasaresulto fsequentialfile
updating and are used for data recovery when the current master file is lost.
UPS: Uninterruptible Power Supply (A device with rechargeable batteries that
provide continuous supply o f electricity to computers for a given period o f time if
there is power cut.
Parallelsystems:Referstotherunningo ftwodifferentsystemsbutdoingthesame
job in the same organisation. Each system will have its own files.
Password:Apasswordisasecretgroupo falphanumericcharactersusedtoprotect
a document or file from unauthorised access
PIN: Personal Identification Number- a secret number used by individual account
holders to access bank account and get service at the ATM, phone, Point o f Sale
terminal (POS) using debit cards, etc.
Firewall: Hardware and associated software used to protect networked private
computersystemsfromunauthorisedaccessbypreventingo utsidedata/usersfrom
enteringthesystemwhileatthesametimepreventinginternaldatafromleavingthe
system.
NB: Note
- Virusesdonoto nlyinfectcomputers,theycanalsoaffectmobilephones,MP3
playersetc.–anydevicewhichcandownloadfilesfromasourcesuchasthe
internet is potentially at risk.
- Backing up may allow filesthathavebecomelost/corrupted(duetohacking
o r viruses) to bereinstated;however,thiswouldnotrecoverthesystemnor
would it prevent hacking/viruses affecting a system in the first place.
Compiled by: Kapondeni T. Cell:0772 245 866 Page30of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- P roblems like spam, pop-ups, cookies, etc. are more o f a nuisance(theycan
alsoslowdowntheo perationo facomputer).Thesecanhoweverbeblocked
(or made inactive) by using suitable software.
When using the Internet, security can be enhanced using encryption.
Credit and debit card transactions can also be protected by a special type o f
password control.
Forexample,ifauserchoosesthepasswordCOMPUTE34toprotecttheircreditcard,
when they buy something over the internet the card issuer will ask the user an
additional question such as: “Please type in the 2 , 4 and 7 character o f your
password in the following boxes:
□□□“
The user will then type in O P E and the card purchase will be authorised. This
additional protection is used as well as encryption.
Someo fthenewsystemsallowsuserslotsthecardintothesideo fthekeyboardand
is required to type in a PIN before the Internet can be accessed. This gives an
additional level o f security since it is necessary to have the card, know the PIN
associated with the card AND also know the user’s log in id and password!!!
Compiled by: Kapondeni T. Cell:0772 245 866 Page31of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- A n e-mail address should be known by many people so that they willknow
the address where to send the emails.
- Every mailbox is protected from illegal access by use of password.
- A password is a secret group o f alphanumeric characters used toprotecta
document from unauthorised access.
- NB.Whencreatingane-mail,o neisrequestedtoenterthepasswordtwicein
o rder to verify if it is the one you intend to use.
- Mailbox: - An electronic folderusedtostoreelectronicmails.Itcontainsthe
inbox; which contains incoming mails; andtheo utbox;whichisusedtosave
o utgoing messages.
Disadvantages of e-mail
● Not everyone has equipment to send e-mails.
● Junk mail (spam) is a problem.
Compiled by: Kapondeni T. Cell:0772 245 866 Page32of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● ou waste a lot of time looking through mails that are just adverts.
Y
● E-mails are not as secure as traditional mails.
● The system relies on people checking their mails regularly.
● Old people feel left out as they consider themselves too old to learn.
● Equipmentusedtosendandreceivee-mailsisveryexpensiveascomparedto
traditional methods.
owever,despitetheincreaseintheuseo fe-mail,therehasbeenasharpincreasein
H
the amount of paper used. This is because:
● People print copies for meetings and then destroy them afterwards, but if
needed again, print out another copy.
● Some people find it difficult reading large amounts of text on the screen.
● Peopleo ftene-mailcolleaguesratherthanusethephonewhothenprinto ut
the document.
Compiled by: Kapondeni T. Cell:0772 245 866 Page33of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● I t becomes safer for employees since no travelling is done (no travelling
accidents).
● There is no need for delegates to leave home/office.
● It becomes easier for several delegates to take part simultaneously.
● communicationlinksarenowmuchfasterthereforeimages,soundqualityetc.
are now far better
● safety reasons (increase in world-wide terrorist activity, frequent travelling,
etc. are all risks to company employees if they have to travel to meetings)
● improvements to the work/general environment (employees can work from
home,
● Less travel means less stress to employees but also means less pollution,
disabled employees are no longer disadvantaged, etc.
● more economical to have short notice meetings
.Viewdata(videotext)systems:Theseareinteractivesystemso nwhichusers
4
view data whentheyaccessspecializeddatabaseslikePrestel.Therequirements
include:
● the telephone line or cable TV,
● specialized keyboard and
● A Television set.
I nformationo nthedatabaseisprovidedbycompaniesthatadvertisetheirproducts
like news, weather reports, and so o n. View data systems have the following
advantages:
● they are interactive and
● service is provided for free to the public.
. Teletext: It is a broadcast service that comes as a television transmission. It is
5
cheaper than the internet service. However, it is non-interactive.
. Facsimile (Fax): A method whereby o utput from a scanned document is send
6
over telephone line and reproduce o n a fax machine o n the receiving end. Fax
method has the following advantages:
● It is very cheap to send messages.
● It is very easy to use.
● It is a very fast method of sending messages.
However, it has the following disadvantages:
Compiled by: Kapondeni T. Cell:0772 245 866 Page34of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
I ts requirements are expensive (fax machine).
●
● There must be a person at the receiving end to attend to the fax when
receiving messages.
B: The use o f fax, e-mail, view data, teletext, teleconferencing and video
N
conferencing in an office brings about an electronic (paperless) office.
- Anelectronico fficeisano fficeinwhichthestorageandprocessingo fdataaswell
as communication are done electronically.
- An electronic office is efficient because:
● Communication is easier and faster.
● Less paperwork is involved.
● Current and up-to-date information is provided.
● Ensures a clean office environment.
- T ele and video conferencing as well as networking bringabouttele-commuting
(tele-working). Tele-commuting is carrying out work without leaving home.
- Communication is done through networked computers.
- Requirementsfortelecommutingincludes:modem,veryfastcommunicationlinks
(for example telephone line), computers, internet services, etc.
Benefits of telecommuting
- Easier to concentrate on work in a quiet environment than in a noisy office.
- It saves time spent in travelling to the work place thereby increasing
productivity.
- It cut costs involved in travelling to work place.
- The employer saves costs o f o ffice space and overheads like water and
electricity.
- People can be recruited from a wide geographical area.
- People with disabilities like the handicapped can be employed.
- People in different locations can work as a team.
Disadvantages of tele-commuting
- Workforce not in office is difficult to control.
- Workers would not understand corporate goals and will not be loyal tothe
o rganisation.
- Employees feel isolated and miss the environment o f an o ffice full o f
colleagues.
- People may find it difficult to work in teams.
- It is difficult to separate work from home duties while at home.
- Unions find it difficult to mobilise workers for demonstrations and strike.
.FileTransfer:allowsuserstotransferfilesfromhostcomputerso ntheinternet
7
to their personal computers.
Compiled by: Kapondeni T. Cell:0772 245 866 Page35of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
.Entertainment:theinternetprovidesano ptionforuserstodownloadandlisten
9
to music, newspapers, radio stations, etc.
To businesses
- Increase in cases of industrial espionage.
Industrial espionage involves selling o f company secrets by employees to rival
companies and the use o f destructive methods by competitors to destroy o ther
o rganisations.
Compiled by: Kapondeni T. Cell:0772 245 866 Page36of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
lot o f money is wasted by the need to re-train the workforce in the use o f new
A
software/computers
Compiled by: Kapondeni T. Cell:0772 245 866 Page37of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
THE CASHLESS SOCIETY
hisreferstothepayingforgoodsandserviceswithouttheuseo fnotesandcoins.It
T
is the use o f electronic commerce therebyreducinghandlingo fhardcashamongst
individuals. However, it seems impossible to completely have a complete cashless
society. Services that contribute towards a cashless society include:
- EDI(ElectronicDataInterchange)-isanelectroniccommunicationsystemthat
provides standards for exchanging data via any electronic means, e.g.
purchase orders, invoices, shipping notices, etc.
- Mobile banking
- Mobile money transfers-Ecocash, Telecash, OneWallet, etc
- Internet banking
- Electronic commerce/internet buying
- EFTPOS-Electronic Funds Transfer at Point of Sale.
- Credits cards/debit cards, coupons, etc
INTRANET
- I ntranet stands for INTernal Restricted Access NETwork, which is a restricted
privateo rganisation’snetworkthatusesinternettechnologiesforthebenefitso f
such an organisation.
- Anintranetisacomputernetworkbasedo ninternettechnologythatisdesigned
to meet the internal needs for sharing information within a single
o rganisation/company
- Intranet requires password entry.
- Intranet is protected by a firewall.
- Intranet only gives local information relevant to the company/organisation
- It is possible to block access to certain sites using the intranet, e.g Facebook.
- it is not always necessary to have external modems when using intranets
- information for use on intranets is stored on local servers
Many companies use intranets as well as the internet for the following reasons:
- it is safer since there is less chance of external hacking or viruses
- it is possible to prevent employees from accessing unwanted web sites
- companiescanensurethattheinformationavailableisspecifictotheirneeds
o nly
- it is easier to keep “sensitive” messages to remain within the company only
Compiled by: Kapondeni T. Cell:0772 245 866 Page38of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Differences between internet and Intranet
Internet Intranet
the INTERNET is INTERnational NETwork a n INTRANET isINTernalRestrictedAccess
NETwork
Internetgivesallinformationincludingthat the intranet o nly gives local information
which is not relevant to the organisation relevant to the company/organisation
Always need external modems forinternet it is not always necessary to have external
connections modems when using intranets
Information o n internet saved in different information for use o n intranets is stored
computers o n local servers
the internet can be accessed from Intranet isaccessedwithintherangeo fthe
anywhere o rganisation’s network
the internet is available to anyone without whereas the intranet requires password
password restriction entry
ireless Communication:
W
This is a method o f networking (linking) computers and computer deviceswithout
the use o f cabling(wires),e.g.usingBluetooth,radio,satellite,infra-red,microwave,
etc. The devices that can be used in wireless technology include:
- Mobile phones /cell phone/remote key pad/remote control/ remote keyboard.
- Infra-red mouse.
- Multimedia mobile handsets and notebooks.
- GPRS (General Packet Radio Service) modems.
- Wireless LAN(or Wi-Fi –Wireless Fidelity: A local area network that uses high
frequency radio signals to transmit and receive data over distances o f a few
hundred feet; uses Ethernet protocol).
- PDAs (personal digital assistants).
Compiled by: Kapondeni T. Cell:0772 245 866 Page39of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- U sers can send, receive, delete e-mail while travelling.
- Users can view business appointments while out of office on mobile.
- Userscansendcorporatee-mailwhileo uto fo ffice-evenbehindafirewallo n
mobile.
- Users can use wireless internet connection from chat roomsfordiscussions
with colleagues while travelling.
I t isn’t just computers that can be linked without wires, various peripheraldevices
can be linked to a computer system without the need for a physical, wired
connection.
For example:
- Printers
- Keyboards
- Mouse
- Digital cameras
COMPUTERS IN ENTERTAINMENT
Music
Compiled by: Kapondeni T. Cell:0772 245 866 Page40of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
omputersarenowusedforplayingandcomposingmusic.Computerhardwareand
C
software advances have changed how music is generated and produced. Software
used includes Fruit Loops, Virtual DJ, etc.
Musical instruments can be connected to a MIDI (Musical Instrument Digital
Interface).
MIDI is a type o f serial interface built intoapieceo felectricalequipmentsothatit
can communicate with the computer. It also converts o utput signals from the
instrument, e.g. guitar, into digital form.
Someo fthekeyreasonsforthewidespreaddevelopmento fmusicusingcomputers
are:
- the recording process for music is faster
- there is no need for tapes during the recording process
- It is easier to remove or add sounds to a track.
- Sampling of sounds is very easy
- actual musical notes can be generated from the music itself by software
- musicsamplersandmixersgiveanalmostlimitlessabilitytoaltertheo riginal
tracks recorded in a studio
- don’t need to understand music notation to write a musical score
- electricinstruments(suchasguitarsando rgans)playbackthroughelectronic
machines
- synthesisers combine simple wave forms to produce more complex sounds
- electric o rgans can now mimic almost any instrument (including a full
o rchestra)
- automatic rhythm
- music notes automatically printed out in the correct format
- Therearemanyo thersoftwareandhardwaredevelopments;theaboveisjust
a summary of the more common elements.
- A performance can be directly recorded o nto the computer and stored ina
MIDI file, which can be edited later.
- Synthesisers are also used to generate notes and desired sounds from
pre-recorded electrical signals. These signals can be combined with signals
from conventional instruments and recorded to produce songs.
Music can be compressed to produce MP3 (motion picture expert) format.
Music can be played using software likeMicrosoftWindowsMediaPlayer,JetAudio,
Nero Show Time, Real Player, etc.
I mage processing: The images can be darkened, sharpened, changed colour,
cropped, etc.
nimation
A
- Animation consists o f displaying a rapid succession o f 2-D o r 3-D graphics
arrangementstocreatetheillusiono fmovement.Itisusedforwebpresentations
and advertisements and for film.
- Computeranimationisthearto fcreatingmovingimagesviacomputerhardware
and software.
Compiled by: Kapondeni T. Cell:0772 245 866 Page41of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- F or 3-D animation, o bjects are designed o n a computer and a 3-D skeleton is
produced.
- Thelimbs,mouth,eyes,etc.aremovedbytheanimatorusingkeyframes.Aframe
can just be a picture/graphic image.
- A start and end of frame is produced.
- Software is used to produce animation between the different frames automatically.
- Thedifferencesinappearancebetweenkeyframesareautomaticallycalculatedby
the computer – this is called TWEENING o r MORPHING. The animation isfinally
RENDERED (i.e. turned into a realistic image).
- Computer animation uses a technique called avars (animation variable) which
control all movement of the animated character.
- Finally,surfacesareaddedrequiringaprocesscalledrendering(i.e.turnedintoa
realistic image).
- avarscanbesetmanuallyusingajoystick.Softwareproducesalevelo fqualityfor
movie animation that would take many years to produce by hand and would
employ several cartoonists/animators.
- This all saves considerable time and money to the film and television producers.
- A vatars are another example o f animation. These are o ften used to represent
peopleeitherin3-D(asusedincomputergames)andin2-D(asusedininternet
message boards).
- Some avatars are animated consisting o f a sequence o f images played o neafter
the other.
- Ultimately, animators want to create a human image which moves and interacts
withitsbackgroundinsuchawaythattheviewerscan’ttellifaparticularsceneis
computer generated o r produced by real actions in front o f an actual movie
camera.
- Sounds can be added to the animation toproduceadvertisements,cartoonsand
films.
- Computers with large hard disk and powerful processorsareneeded,aswellas
high resolution monitors
- Special effects in many modern films (televisions) all usecomputeranimationto
produce fantasy worlds.
Compiled by: Kapondeni T. Cell:0772 245 866 Page42of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
(a)Input Hardware:
- barcode reader (automatically enter details o f goods purchased into the
computer by scanning them),
- keyboard (manually typing in product codeifthebarcodereaderfailstodo
so),
- mouse (selecting item by clicking)
- touch screen: for selecting menu and entering datainto the computer
- swiping machine: for entering PIN and swiping debitcards
(b)Output Devices:
- printer(producing receipts),
- monitor (VDU) -displays item details and itemsthatarebeingpurchasedby
the client, amount paid and change
he POS terminals can also be connected to the main server in banks like CABS,
T
Barclays, etc. This enables customers to purchase goods electronically without the
burden o f carrying casharound.ThisiscalledElectronicFundsTransferatPoint
of Sale (EFTPOS). Customers can also be given cash back at the EFTPOS after
purchasing goods using debit cards.
Compiled by: Kapondeni T. Cell:0772 245 866 Page43of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
fterpurchasingthegoods,areceiptisproduced.Thereceiptwillhavethefollowing
A
details:
- date of purchase,
- time purchased,
- shop attendant,
- item (s) bought,
- quantity bought,
- unit price,
- total price,
- amount tendered,
- change,
- cashier name
- etc.
B. The system updates the master file when an item is sold. It first searches the
N
master file. Usingthebarcodenumber(orproductcode)itdecreasethenumberin
stock and increase the quantity sold
* NB: POS –Point of Sale terminal: the point where customers pay for goods
purchased in shops, either by cash or otherwise.
Compiled by: Kapondeni T. Cell:0772 245 866 Page44of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ifference between Electronic Point Of Sale (EPOS) and Electronic Funds
D
Transfer at Point Of Sale (EFTPOS).
EPOSterminalo nlyinvolvesscanningo fgoodselectronicallybyuseo fbarcodesand
bykeyboardentry.EFTPOSinvolveselectronicscanningo fgoodsatpointo fsaleby
use o f scanners and barcodes (and use o f keyboard) and has an added featureo f
allowing customers to transfer money from o ne account to another, usually to the
account o f the shop where the goods are being bought. Customers can also get
cash-back at the EFTPOS terminal in shops.
LOGIC GATES
- A logic gate is a device that produces signals o f 1 o r 0 when the input logic
requirements are met and are used in manipulating binary information.
- A logic gate is a device (or electrical circuit) that performs o ne o r more logical
o perations on one or more input signals.
- Its output representBoolean(T or F) or binary values(1 or 0) as voltages.
- Logic gates are the building blocks of digital technology.
- They can be used in applications like:
● Building computer chips
● Programming traffic signals
● Chips for automatic alarm systems
● Chips for automated control systems
- Electronic circuits operate using binary logic gates.
- Logic gates process signals which representTRUEo rFALSE,ONo rOFF,1o r0
Compiled by: Kapondeni T. Cell:0772 245 866 Page45of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● T ruth tables contains 1s and 0s and are an integral part o f logic gates
functionality.
● Truth table and logic gates use the following:
- 1 (True, ON, Not False)
- 0 (False, OFF, Not True)
he number o f rows in a truth table shows the numbero fcombinationso fthe
T
inputso faparticularcircuit.Thenumbero frowsforeachgateisfoundusingthe
followingformulae:rows=2n ,nbeingthenumbero finputsinthegateo rcircuit.
For example, a gate o r circuit has the following rows corresponding to the
number of input (excluding column headings):
- 1 input = 21= 2 rows
- 2 inputs = 22= 4 rows
- 3 inputs = 23= 8 rows
- …..
Graphical Representation of Gates and their Truth Tables
achlogicgatehasitsownuniquegraphicalrepresentation,whichcanbeingeneral
E
form or in standard form.
(1)General form
Each logic gate has a circle and the name o f thegatetodifferentiateitfrom
the rest as given below:
The name inside the gate gives us the type of the gate
(2)Standard Representation
In standard form, each logic gate has its own unique diagram. Even if the
name o f the gateisnotwritten,o neknowswhatitstandsforbecauseo fthe
shape. The following are the logic gates and their shapes in standard form.
(a)OR gate
his represents two inputs entering the gate and o ne o utput from the gate.
T
The inputs can be represented by any alphabetic characters, e.g. A and B,
while the output can be X, given as follows:
Compiled by: Kapondeni T. Cell:0772 245 866 Page46of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- = AORB
X
- The output (X) istrueif theINPUT A OR INPUT Baretrue.
- Thus if any one of the inputs is 1, the output is automatically 1
- Output only becomes 0 if all inputs are 0
(b)AND gate
This is represented as follows:
Compiled by: Kapondeni T. Cell:0772 245 866 Page47of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
The output (X) isFalsewhen theINPUT AisTRUE.
(e)NAND gate
Logic Gate Diagram Truth table
combination o f logic gates, which may be different, gives a logic circuit as given
A
below:
Compiled by: Kapondeni T. Cell:0772 245 866 Page48of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Boolean Expressions
oolean Expressions are equivalent expressions o f the logic state o f gates. For
B
example, the Boolean expression for:
ANDandNORgatesareknownasuniversalgatesbecausetheyareinexpensiveto
N
manufacture and any Boolean function (AND, OR, NOT) can be constructed using
o nly NAND o r o nly NOR gates. Even NAND and NOR gates can be used as each
o ther’s alternatives in a circuit.
xpressions using mathematical symbols can be used to represent logic gates.One
E
may be required to draw logic gates using such mathematical expressions Such
symbols and their meaning are as given below:
steel rolling mill is to be controlled by a logic network made upo fAND,ORand
A
NOTgateso nly.Themillreceivesastopsignal(i.e.S=1)dependingo nthefollowing
input bits:
Compiled by: Kapondeni T. Cell:0772 245 866 Page49of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Either: Length, L > 100 metres and Velocity, V < =10 m/s
raw a logic network and truth table to show all the possible situations when the
D
stop signal could be received.
Answer
B: the Student should first of all write the following logic statement before
N
comingupwithatruthtableorlogicc ircuitasthishassomemarksawardedto
it., i.e.
- U
sing the logic statement above, o ne can now draw the logic circuit as given
below:
- One can now draw the truth table, basing from the logic statement in Step 1.
Compiled by: Kapondeni T. Cell:0772 245 866 Page50of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Questions
. A computer will o nly o perate if three switches P, S and T are correctly set. An
1
o utputsignal(X=1)willo ccurifRandSarebothONo rifRisOFFandSandTare
ON. Design a logic network and draw the truth table for this network.
2. A traffic signal system will only operate if it receives an output signal (D = 1).
Or (b) signal A is green (i.e. A = 1) and signals B and C are both red (i.e. B
Design a logic network and draw a truth table for the above system.
.Achemicalplantgiveso utawarningsignal(W=1)whentheprocessgoeswrong.
3
A logic network is used to provide input and to decide whether or not W = 1
raw a logic network and truth table to show all the possible situations when the
D
warning signal could be received
Compiled by: Kapondeni T. Cell:0772 245 866 Page51of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
. A power station has a safety system based o n threeinputstoalogicnetwork.A
4
warning signal (S =1)isproducedwhencertainconditionso ccurbasedo nthese3
inputs:
Either : (a) Temperature > 120C and Cooling Water <= 100 l/hr
raw a logic network and truth table to show all the possible situations when the
D
warning signal could be received.
8. a. Simplify the following logic equations by using the rules of Boolean algebra.
a. A • C + A • B • C
b. (A + B) • (B + Ā )
c. A • (Ā + C) + C
. For each o f the previous questions, create a circuit for the Boolean expression
b
before simplification.
Compiled by: Kapondeni T. Cell:0772 245 866 Page52of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
AM(COMPUTER-AIDED MANUFACTURE)
C
This is automated manufacturing process where computers are used to regulate
(control) and monitor the production process in industries.
CAM uses some industrial robots or computer-controlled sensors for detecting:
● Excessive heat
● Faults
● Acceleration forces
CAM works well with CAD systems. Machinery is programmed automatically
A real CAD/CAM system enables any engineering component to be designed and
manufacturedusingnumericallycontrolledmachinetools.Thecomputermakesome
calculations for defining the tool path and generates the instructions necessary to
produce the part.Amachinetoolsuchasalatheiscontrolledbyacomputerwhich
sends it instructions to select tools and to use them to make metal components.
CAMandCADsystemsystemsareintegrated.DatafromCADsystemisconvertedtoa
seto finstructionsfortheprocessorcontrollingtheCAMequipment.Onceaparthas
been designed using the CAD software, the o ther processes are automatic. The
following are involved:
(a) Conversion of data into a set of machine tool instructions;
(b) Operation of the CAM system:
a. Selection of tools, e.g. cutter, drills, etc.
b. Selection of speed e.g. for drills
c. Movement of the tool to machine the part being manufactured.
COMPUTER NETWORKS
efinition of Terms
D
a. Network: A connection o f computersforthemtosharedata,filesandresources
like a printer.
b. Data communication: The process o f transferring data through networked
computers
dvantages of Networking
A
- Expensive peripherals like printers and scanners can be shared between users.
- Messages can be sent easily and faster between users whether on WAN or LAN.
- Avoids duplication o f information as users can access the same file o n the
network.
- Networksoftwarecanbepurchasedcheaplythanbuyingindividualpackagesfor
each computer.
Compiled by: Kapondeni T. Cell:0772 245 866 Page53of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- I t is possible to access data or programs from any terminal or workstation.
- Data and programs can be stored centrally making it easier to maintain and
backup.
- Users can be easily prevented from accessing files not intended for them.
- Allows sharing of files, software and data held in computers.
- Allows emails to be send between users.
isadvantages of Networking
D
- Sophisticated equipment is needed, which may be expensive to buy.
- Security of data can be a problem due to hacking.
- Wiring can be expensive both to buy and to install; wiring can be sunk o n the
ground to avoid trailing cables.
- If a server breaks down, the whole network becomes unusable.
- Networks need experienced network managers, who will be highly paid tokeep
the network running.
ypes of Networks
T
- Computer networks are grouped into Local Area Networks (LAN) and Wide
Area Networks (WAN).
- However we also have WLAN (Wireless Local Area Networks), MAN
(Metropolitan Area Networks) and PAN(PersonalAreaNetworks);andthese
are described below.
Compiled by: Kapondeni T. Cell:0772 245 866 Page54of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
. Network c ards for each computer/terminal: -adevicethatidentifiescomputers
5
to the network, where network cables are plugged on the computer
B:AbridgecanalsobeconnectedtolinkaLocalAreaNetworktoanothernetwork
N
and isan optionalrequirement.
owever, some networks are now using wireless technology and these are called
H
WirelessLocalAreaNetworks(WLAN).WLANusesradiosignalsandthereforeno
cabling is required.
The diagram below shows thestructureo faLANthatcanbeconnectedtoanother
network.
Compiled by: Kapondeni T. Cell:0772 245 866 Page55of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
PAN enables user to transfer files from a laptop to a PDA, camera o r Personal
A
Computer.
. Ring Network:
1
- Computers are connected together to form a circle and uses a token when
transferring data.
- Data/information travels in one direction only.
- Information moves around the ring in sequence from its source to its destination.
- Asdatapassesfromo necomputertoanotherinthering,eachcomputerremoves
any data relevant to itself and adds any data it wishes to send.
- The diagram below illustrates the physical configuration of a ring network:
Compiled by: Kapondeni T. Cell:0772 245 866 Page56of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- If o ne computer breaks down, o therswillremainworkingastheyhavetheirown
processors and storage facilities.
- Performs better than star network when traffic is very heavy.
. Star Network:
2
Computers form a star shape with host computer at the centre.
The Server (host computer) manages all other computers/terminals on the network.
If the terminals are not intelligent, they have to rely o n the host computer for
everything.
This network is as shown below:
Compiled by: Kapondeni T. Cell:0772 245 866 Page57of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
isadvantages of a Star Network
D
- If the host computer breaks down, the whole network will be disrupted.
- Ifthehostcomputerisdown,alltheterminalswillnotworkastheydependo nthe
host for processing and storage.
- It requires a lot of cabling, which might be expensive.
- Can be slower if overloaded
. Mesh Network
3
- A network in which each computer serves as a relay point for directly sending
information to any other computer on the network.
- Nocentraldeviceoverseesameshnetwork,andnosetrouteisusedtopassdata
back and forth between computers.
- Thus, if any o ne computer isdamagedo rtemporarilyunavailable,informationis
dynamically rerouted to other computers—a process known asself-healing
Compiled by: Kapondeni T. Cell:0772 245 866 Page58of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
efinition of Terms
D
(a)Bus/Backbone:thededicatedandmaincablethatconnectsallworkstationsand
o ther computer devices like printers.
(b)Nodes: these are connection points for workstationsand the bus.
(c) Terminator: devices that prevent data in the bus from bouncing back, causing
noise and prevents data from getting lost.
B:Point–to-PointConnection:Point-to-pointtopologyisthesimplestconnection,
N
consisting of two connected computers.
Compiled by: Kapondeni T. Cell:0772 245 866 Page59of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Less difficult to administer
- Appropriate for small businesses
- Security is not centralised
- Backup is a responsibility of individual computer user
- Cheap to use
- No need for special network operating system
iagram:
D
ETWORK PROTOCOLS
N
A protocol is a set o f rules that governs how communication between twodevices
will occur. Such devices might be computers themselves, between modems.
A network communication protocol: a standard method for transmitting data from
o necomputertoanotheracrossanetwork.Someo ftheprotocolsthatwearegoing
to look at are:
i. TCP/IP (Transmission Control Protocol Internet Protocol)
TCP: It ensures that data is transmitted accurately
IP: It ensures that data is transmitted to its correct address (IP address).
Every device o n the internet has its IP address. It also ensures that packets
are rearranged to the original message on arrival of their destination.
ii. HTTP (HyperText Transfer Protocol)
This is a protocol that defines the process o f identifying, requesting and
transferring multimedia web pages over the internet. It is used for
transferringdataacrosstheinternet,usuallybetweenserversandcomputers
o ntheinternet.Itisbasedo ntheclient–serverrelationship.ItusesTCP/IPto
transmit data and messages
iii. FTP (File Transfer Protocol)
itisaprotocolusedtotransferdatafromo necomputertoanother.Itiso ften
usedtodownloadsoftwarefromtheinternet,anditusestheTCP/IPprotocol
in doing this. However, FTP has no security to data as the data is not
encrypted prior to its transmission.
iv. TELNET
This is a network protocol that allows a computer user to gain access to
anothercomputeranduseitssoftwareanddata,usuallyo naLANando nthe
Internet.Itallowsuserstoaccessdatastoredo nserversfromtheirterminals.
Telnet allows computers toconnecttoeacho therandallowssharingo fdata
and files. Telnet has security problems especially on the internet.
v. VoIP (Voice Over Internet Protocol)
It is a method o f using the internet to make o rdinary voice telephone calls.
Thusitisawayo fhavingphoneconversationsusingtheinternetasawayo f
communication.ByVoIP,internationalandlongdistancecallsareo fthesame
priceaslocalcallsandsometimesareforfree.However,thesystemdoesnot
o ffer emergency calls. An example of VoIP is Skype.
Compiled by: Kapondeni T. Cell:0772 245 866 Page60of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ystem: A groupso felementsworkingtogethertoachieveacommongoal.Systems
S
are of two types:
Physical system: refers to tangible systems like schools,firm, shop, etc
Conceptualsystems:theseexistinmindo rpaperandcannotbetouched.Theyjust
represent a physical system.
This chapter is concerned with the development and maintenance o f system like
stock control, patient monitoring, banking and payroll which are part o f physical
systems.
he systems analyst
T
Thisisapersonwhoidentifiesproblemso ftheexistingsystemandrecommendsthe
best solution to such a problem. The duties of a systems analyst are:
● Identifies the problems of the current system.
● Liaises with system users and determine their requirements.
● Finds out facts important to the design of the new system.
● Determines the human and computer procedures that will make up the
system.
● Participates in the process of system implementation.
Compiled by: Kapondeni T. Cell:0772 245 866 Page61of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ystems Development Life Cycle (SDLC)
S
Thisreferstothestagesthroughwhichasystemdevelopsfrom‘birth’to‘death’,i.e.
from the moment the system is incepteduntilitismodifiedo rreplacedwithanew
o ne.
Can also be referred to as the Waterfall Model
The stages, in their order, include:
● Problem identification,
● Fact Finding
● feasibility study,
● analysis,
● design,
● Development and testing
● Documentation and user training
● implementation,
● Evaluation/review/maintenance.
. Problem identification/Recognition/Definition/Realisation:
1
This is where the problems of the current system are stated.
These might have beenrealisedbysystemuserso rbymanagers.Thesystemmight
be producing wrong results.
This includes the general statement o f the problems being experienced by the
system.
Compiled by: Kapondeni T. Cell:0772 245 866 Page62of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
his isthestagewherebytheanalystcollectsdatafromusers,managementandthe
T
stakeholders, about the current system. Each data collection procedure is
appropriate for a given situation, not in all cases. A number o f data collection
techniques are employed, including the following: Questionnaire, interview, Record
inspection and Observation.
Some automatic data collection procedures may be used also.
i . Interview:
Thisreferstotheface-to-facecommunicationbetweentwoo rmorepeopleino rder
to o btain information. Interviews can also be done over the phone but the most
common o nes are face to face. Interviews are done when you want to collect
information from a very small population sample.
Advantages of Interviews
● The researcher can ask for clarification on some points that may not be clear.
● Encourages good rapport between the researcher and the respondent.
● Non-verbal gestures like facial expressions can help the researcher to
determine if the respondent is telling the truth.
● Information can be collected even from the illiterate since the respondent’s
language could be used.
● First-hand information is collected.
● The researcher can probe to get more information.
Disadvantages of Interviews
● It is impossible to remain anonymous on the part of the interviewee.
● It is expensive since the researcher has to travel to the interview venue.
● It is time consuming as more time is spent travelling and carrying o ut the
interview.
● Good interview techniques are required as failure may lead to
disappointments.
● Biased information can be given since the respondent may not tell the truth.
Compiled by: Kapondeni T. Cell:0772 245 866 Page63of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● M anual files can be tiresome to go through and some o f the data may be
illegible.
● Confidential files are not given to the researcher
i ii. Questionnaire:
A document with carefully crafted questions to be answered by therespondentby
filling o n the spaces provided.Questionnairesareusedwhencollectinginformation
fromawidelyspacedpopulationsampleandwhencollectinginformationfrommany
people. A questionnaire contains o pen-ended and closed questions. Open-ended
questions are gap filling questions which require the respondent to expresshiso r
her own view. Closed questions are guided questions where the respondent just
chooses Yes o r No, True o r False, o r by just putting a tick o n given o ptions.
Questionnaires can be distributed personally or by post.
Advantages of questionnaires
● Questions are very simple and faster to answer.
● It saves time as questionnaires can be distributes and then collected later.
● Respondents can fill questionnaires at their own pace.
● Giveguaranteesconfidentialo finformation,therebyencouragingrespondents
to give accurate information.
● They are cheap to use when collecting data from a very large sample
Disadvantages of questionnaires
● Some questions are left blank.
● Some questionnaires may not be returned at all.
● Biased information can be collected as people may lie.
● Respondents usually do not fill the correct information.
● It is difficult to analyse information collect using questionnaires.
● They are expensive to use if the postal system is used.
● Abusive information can be filled by respondents.
● It is difficult to prepare a good questionnaire
i v. Observations:
Itisafactfindingmethodthatinvolvesviewingtheactualsystemino perationbythe
researcher. The researcher can even take part in o perating the system. It is used
when the researcher wants to see for himself how the system operates.
Advantages of observations
● First-hand information is collected.
● Accurate information can be obtained.
● Areas of interest can be observed.
● The researcher can take part ino peratingthesystemtherebygettinginsight
o n how the system operates.
● the analyst obtains reliable data
● it is possible to see exactly what is being done
Disadvantages of observations
● People work differently if they feel that they are being o bserved, therefore
inaccurate information can be collected.
● The researcher may not understand some of the activities being observed.
● It is time consuming to collect the required information.
● The researcher may interrupt some of the activities being done.
Compiled by: Kapondeni T. Cell:0772 245 866 Page64of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● if workers perform tasks that violate standard procedures, they maynotdo
this when being watched!!
. Feasibility Study:
3
It involves an evaluation o f proposalstodetermineifitpossibletoconstructanew
system o r just modification o f the existing o ne. Feasibility can be measured by
making the following considerations:
Economic feasibility: determining whether the benefits o f the new system will
o ut-weigh the estimated cost involved in developing, purchasing, assembling
requirements, installing and maintenance o f the new system. The cost-benefits
analysisiscarriedo ut.Benefitscanbetangibleandquantifiable,e.g.profitsinterms
o f monetary values, fewer processing errors, increased production, increased
response time, etc. Other benefits are intangible, e.g. improved customer goodwill,
employee moral, job satisfaction, better service to the community, etc.
Technicalfeasibility:determinesiftheo rganisationcano btainsoftware,equipment
and personnel to develop, install and operate the system and even to maintain it.
Social feasibility: a measure o f the system’s acceptance by the generalpublic;ifit
will meet the norms and values of the society.
Legal feasibility: This is determining if the system can conform to the laws and
statuteso fthecountry.Thisisdonebyconsideringgovernmentlegislation,e.g.Data
processing system must comply with the local Data Protection Acts
Operational feasibility: determines whether the current work practices and
procedures are adequate to support the system, e.g. effects o nsocialliveso fthose
affected by the system, can it work well with existing hardware, etc
Operational feasibility assessment focuses o n the degree to which the proposed
system fits in with the existing business environment ando bjectiveswithregardto
development schedule, delivery date, corporate culture, and existing business
processes
fter carrying o ut the feasibility study, a feasibility study report mustbeproduced
A
and it contains the following information:
- A brief description of the business.
- Advantages and problems of the existing system.
- Objectives of the new system.
- Evaluation of the alternative solutions.
- Development timetable.
- Management summary.
- Terms of reference.
- Proposed solution.
. Analysis stage:
4
This is the in-depth study o f the system to determine how data flows within the
system.
Analysis tools used includes:
- Decision trees
- Decision tables
It involvesuseo fflowcharts,dataflowdiagrams,structurediagrams,decisiontrees,
and o thers, to describe the o perations o f the system in detail. The analysis stage
determines whether computerisation will take place o r not. Theanalysisstagealso
specifiesthehardwareandsoftwarerequirementso fthenew/proposedsystem,the
advantages and disadvantages of the proposed solution, etc.
Analysis stage also involves identification of the following:
Compiled by: Kapondeni T. Cell:0772 245 866 Page65of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- A lternative solutions: other solutions, not considering the chosen one
- Specification requirements: o ther system requirements like hardware,
software, personnel, etc
- Carrying o ut the Cost-benefit analysis: weighing o ut costs o f developing the
new system versus the benefits that will be realised.
ataflow Diagrams
D
These are diagrams that show how data moves between externalsources,through
processes and data stores o f a particular system. Dataflow diagrams use the
following symbols:
. Design Stage:
5
This stage is concerned with the design o f the new computer based solution as
specified by the analysis stage. Design stage involves:
Input Design: includes designing o f data entryforms,inputmethods(e.g.byfilling
forms, use of barcodes, etc) and the user interface.
OutputDesign:Includesdesigno freports,datao utputformats,screendisplaysand
o ther printed documents like receipts, etc
File design: Involves designing tables/files, records and validation rules. It also
involvesdetermininghowdataistobestoredandaccessed,themediatobeusedfor
storage and the mode o f file o rganisation. Fields in each filescabedesigned,their
length and data type, e.g.
File Structure:
Compiled by: Kapondeni T. Cell:0772 245 866 Page66of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
he computer environment is prepared, the programs to be written are done and
T
they are tested to determine if the run as expected.
omputerenvironmentbeingprepared:electricalwires,networkcablesareinstalled,
C
furniture, air conditioning are in place. The computers are installed and tested.
Italsoinvolvestheconstructionandassemblingo fthetechnicalcomponentsthatare
needed for the new system to o perate. This includes preparation o f the computer
room environment, coding o f the computer program using aspecificprogramming
language, testing of the coded program,
Testing strategies
- standard (normal) data testing: testing o f data within the given range
(should be accepted)
- abnormal data testing: testing o f data o utside the given range (should be
rejected). It gives an error message when entered into the computer system.
Compiled by: Kapondeni T. Cell:0772 245 866 Page67of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- e xtreme (boundary) data testing: testing o f the minimum and maximum
values in the given range (should be accepted)
( a) User Documentation: It is a manual that guides system userso nhowtoload,
o perate, navigate and exit a program (system). User documentation contains the
following:
✔ System/program name.
✔ Storage location.
✔ System password.
✔ Instruction on how to install the program.
✔ Instruction on how to operate the system: e.g.
o How to quit the program
o how to load/run the software
o how to save files
o how to do print outs
o how to sort data
o how to do a search
o how to add, delete or amend records
o print layouts (output)
o screen layouts (input)
o the purpose of the system/program/software package
o error handling/meaning of errors
o troubleshooting guide/help lines/FAQs
o how to log in/log out
( b)TechnicalDocumentation:Thisisamanualforprogrammerswhichaidthemin
modifying the system and in correctingprogramerrors.Thefollowingarefoundin
technical documentation:
✔ Algorithms of the program,
✔ Program testing procedures and test data,
✔ Sample of expected system results,
✔ Program structure showing modules and their relationships,
✔ System flowcharts,
✔ Programming language used,
✔ Program code,
✔ program listings,
✔ File structures.
✔ Validation rules
✔ Output formats
✔ Bugs in the system
✔ Hardware requirements
✔ Software requirements
ser Training:
U
Onceanewsystemisputinplace,existingemployeesaretrainedo nhowtoo perate
thenewsystem,o therwisenewemployeesarerecruited.Usersaretrainedo nhowto
enter data, search records, edit fields, produce reports, handling errors, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page68of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ser training can be in the following forms:
U
i.Onthejobtraining:Usersaretrainedattheiro rganisationbyhiredtrainers.This
has the following advantages:
✔ Learners practice with actual equipment and the environment of the job.
✔ Learners can engage in productive practices while on training.
✔ This is cheaper for the organisation.
✔ Enough practice (experience) is gained on how to operate the system.
✔ Production does not stop
. Parallel Run: This involves using o f both the o ld and new system concurrently
a
until the new system proves to be efficient. It involves o perating the new and o ld
systems simultaneously until management is confident that the new system will
perform satisfactorily. Other workers will be using the o ld systemwhileo thersuse
the old system but doing the same type of job.
Advantages of parallel run
✔ Results for both systems are compared for accuracy and consistency.
✔ If the new system develops problems, it will be easier to revert to the old one.
✔ Thereisenoughtimegiventodetermineifthenewsystemproducesexpected
results.
✔ Employees have enough time to familiarise with the new system.
Compiled by: Kapondeni T. Cell:0772 245 866 Page69of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
i ii. Phased / Partial conversion: This is whereby the o ld system is gradually
removed while the new system is gradually movedinatthesametime.Thiscanbe
donebycomputerisingo nlyo nedepartmentinano rganisationthismonth,thenthe
next department in two months’ time, and so o n until the whole system is
computerised.
i v. Pilot conversion: This is whereby a program is tested in o ne o rganisation (or
department), and is applied to the whole o rganisation if itpassesthepilotstage.It
serves as a model for o ther departments. A pilot program can then be applied in
phases, directly or using the parallel run method.
NB: before making system live, the following musthave taken place:
- Production of user documentation and technical documentation
- Installation of hardware and software
- fully testing the new system
- training the staff to use the new system
. Maintenance/review/evaluation Stage:
9
This stage is concerned with making upgrades and repairs to an already existing
system. Certain sections of the system will be modified with time.
Compiled by: Kapondeni T. Cell:0772 245 866 Page70of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
aintenance can be to Perfect the system, to Correct some errors o r to make it
M
adapt to changing needs, e.g changeingovernmentlaws.Maintenanceinvolvesthe
following:
● update hardwareasnewitemscomeo nthemarketo rthecompanychanges
in any way which requires new devices to be added/updated
● update software if necessary if company structure changes o r legislation is
introduced which affects how the company operates
( C) System Flowcharts
A systemsflowchartisadiagramusedtoshowhowallthecomponentsinasystem
link together (e.g.input,storage,o utput,processing,etc.).Theyareverydifferentto
normalflowchartssincetheydon’tgointodetailo fhowsomethingisactuallydone–
they are a general overview. It showstheoverviewo fthesystem,taskscarriedo ut
by the system, whether manual o r computer, devices, o utput media and files used,
etc.
Common symbols for designing systems flowcharts are as follows:
Compiled by: Kapondeni T. Cell:0772 245 866 Page71of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
* NB: Meanings o f these symbols are not universal and mean a different thing to
o thers. Some symbols are borrowed from program flowcharts.
Compiled by: Kapondeni T. Cell:0772 245 866 Page72of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
elow is a systems flowchart for a B
B elow is a systems flowchart that is
payroll processing system that uses usedtoupdateastockmasterfilewhen
batch processing stock items are purchased.
Review Questions
1. (a)Asystemsanalystwasbroughtintocomputeriseapaper-basedcarsales
system. What methods could be used to gather data about the existing
system? Give reasons for your choice.
(b) What would need to be done before the new computerised system
become ‘Live’?
(c)WhywouldPILOTandPARALLELchangeovermethodsbesuitableinthis
application?
2. A program is written to input daily temperatures. Name three types o f test
data that could be used.Giveexampleso feachtypeo ftestdatawhichcould
be used and discuss the outputs you would expect to get.
3. Name five tasks that would be carried o ut at the DESIGN stage in systems
analysis.
4. Name four methods used to change over from a manual system to a new
computerised system. Discuss the relative advantages and disadvantages o f
these four methods.
5. Describe how the effectiveness of a new computer system can be assessed
6. What tools exist to help the analyst draw up anactionplanandensurethat
the project is completed on time and to budget?
7. What information would asystemsanalystneedtogathertodecideo nwhat
hardware is required for a new computerised system?
8. State 5 items that need to be included in the User guide and 5 items o f the
technical guide of a newly developed computer system.
9. Choose 6 symbols used in systems flowcharts and explain what each means.
Compiled by: Kapondeni T. Cell:0772 245 866 Page73of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ATA CAPTURE / COLLECTION
D
Data capturing can be either automatic or manual.
Manualmethodsareslowinenteringdataandarealsopronetoerrors,e.g.typing
2.3 instead of 3.2. Manual data capturing techniques includes the following:
- keyboards/keypads to type in data
- touch screens to select data/options
Automatic data capturing techniques are more accurate and faster but are more
expensive and involves use of the following:
(a) Data logging: this technique involves collecting data automatically using
sensors; mostly used when doing scientific experiments o r monitoring a
control system
(b) Barcode readers: these take data from printed barcodes and allow
automatic stock control in, for example, supermarkets.
(c) RadioFrequencyIdentification(RFID):thismethodinvolvesusingsmall
electronic devices containing a microchip and antenna; they work in a
similarwaytobarcodesbutcanbereadfromadistanceo f5metres;o ften
used to track livestock, vehicles, library books and goods sold in shops.
(d) Biometrics: this involves o btaining data and identifying characteristics
automaticallyinsecuritysystemse.g.useo ffingerprints,palmprints,facial
images and iris prints
(e) Magnetic Strips: these contain information/data stored o n magnetic
material o ften o n the back o f a credit/debit card; the information is
automatically read by swiping the magnetic stripe past a reading head
(reading device).
(f) Optical character recognition(OCR):informationo npaperisautomatically
read by a scanner and is then analysed/processed by OCR software and
stored in an electronic format.
( g) Voice recognition: these systems recognisespokenwordse.g.fordisabled
people who can’t use keyboards where they speak commands instead o f
having to type
(h) Smart cards: these containembeddedmicrochipsandreceivepowerfrom
the card readers; the microchip is made up o f RAM, ROM and 16-bit
processor and the stored data is automatically read by the card reader;
used in credit cards, security cards, loyalty cards, etc.
(i) OpticalMarkRecognition(OMR):OMRtechnologyscansaprintedformand
reads pre-defined positions (where specific fields have been filled in e.g.
●─● o r ▄); the system records where marks have been made so can
automatically determine responses to, for example, a questionnaire.
ypes of Errors
T
1.TranscriptionErrors:Thesearemistakesduetomisreadingo rmistypingo fdata,
e.g.,confusingthenumber5withtheletterS,0(zero)insteado ftheletterO,etc.This
can also be caused by bad handwriting.
Compiled by: Kapondeni T. Cell:0772 245 866 Page74of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
.TranspositionErrors:Thesearemistakescausedbyswapping2letterso rdigits,
2
e.g. typing ‘ot’ instead o f ‘to’, 5721 instead o f 7521. Transposition errors o ccur
mostly when typing at very high speeds.
. Validation: A process done by the computer to detect if data entered is valid,
2
correct, complete, sensible and reasonable. For instance the height o f a person
entered as 12 metres is incorrect, is not sensible, neither is it reasonable, and
thereforethecomputershouldrejectthis.Validationisaprocesso fcheckingifdata
satisfiescertaincriteriawheninputi.e.fallswithinacceptedboundaries.Validationis
done by the computer.
Compiled by: Kapondeni T. Cell:0772 245 866 Page75of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ameisneeded,e.g.John5iswrongsincethereisawrongcharacterinthename,i.e.,
n
5.
(b)RangeChecks:Arevalidationchecksperformedo ndatatomakesuretheyliein
a specified range. For example,youarerequiredtoenteranumberbetween5and
20, and you enter 51, the computer should automatically reject this since it lies
o utside the required range.
(c) Limit Check: this is similar to a range check except o nly ONE o f the limits
(boundaries) is checked e.g. input data must be > 10.
(d) Presence c hecks: check that data isactuallypresentandnotmissedo ute.g.in
Student form, somebody’s Student Surname may been left o ut yet it is a required
fieldname.Thecomputerdoesnotallowtheusertocontinueuntilanentryhasbeen
made in a required field name.
(e)Lengthc hecks:Thesearevalidationchecksusedtodetermineifdataenteredis
o ftherequirednumbero fcharacters.Forexample,ifastudentnumberhas5digits,
the computer should reject if a number with 4 o r lessdigitso revenmoredigitsis
entered.
(f) Format Check: this checks thatdataisinaspecifiedformat(template)e.g.date
should be in the form dd/mm/yyyy.
( g)Consistence(CrossField)Check:thischecksiffieldscorrespondwiththeo ther,
e.g. if o ne enters ‘MR’o nTitlefield,theSexfieldmustcontain‘Male’o r‘M’.Ifo ne
entersthetitleasMrandtheno nsexentersFemale,thereisnocorrespondenceo n
the two fields and therefore the computer must reject this.
(h) Spell Checkers: These are validationchecksthatdetermineifaccuratetexthas
been entered especially in word processing. Spell checkersusecustomdictionaries
to check spellingmistakesindocuments.Ifawordistypedin,itischeckedifitisin
thecustomdictionary,ifnot,itistreatedasanerror.Spellcheckerscannotbeusedin
case of names of people, places, computer jargon, new slang words, etc.
(i)ControlTotal:thisisameaningfultotalo btainedbyaddingtogetheralldataina
table, e.g. prices o f goods to give a total. If the total does not tally, then o ther
elements may have been left o ut. This total is meaningful since it may be used to
deduce if the organisation is making profit or not.
( j) Hash Total: It is a meaningless total, o btainedbyaddingtogetheralldigitsina
field like serial numbers o f a product to give a total that is used for validation
purposes o nly. The total o btained is not, and cannot be used to deduce any o ther
meaning. Thus in this case, the total o btained by adding product serial numbers
cannot be used for any other purpose.
(k) Check Sum:Avalidationchecko faddingtogetherthedigitsinablocktogivea
number that will be transmitted together withthedata.Itisusedtocheckwhether
errorshaveo ccurredintransmissiono rstorage.Checksumcanalsoimplyhashtotal
and control total.
(l)DataTypec heck:Thisisusedtocheckifdataenterediso fthecorrectdatatype.
For example, Quantity of Items bought is an integer data type, therefore it must
rejectfractions.Thusthecorrectdatatypeisconsideredinthissituation.Datatypes
includes Boolean, integers, char, etc.
( m) Check Digits: A check digit is an extra digit appended to the right -end o f an
o riginal number for error checking purposes and is calculated from the o riginal
block of data using modulus 11.
*NB: - Check digits are used where data is entered automatically as in using
barcode readers and are important for c hecking for transposition errors
(swapped digits)
Compiled by: Kapondeni T. Cell:0772 245 866 Page76of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
alculating Check Digits
C
Using the Modulus 11 method: Suppose a product number has been enteredas:
151211323; the following procedures will be used tocalculate its check digit.
e have 9 digits. Working from the right, the first digit is multiplied by 2, second
W
number by 3, third number by 4 andsoo n.Westartat2becauseposition1isfor
the check digit. The results are added together, e.g.
(1x10) + (5x9) + (1x8) + (2x7) + (1x6) + (1x5) + (3x4) + (2x3) + (3x2) = 112
Thetotal(112)isdividedby11andtheremainderisnoted;e.g.,112dividedby11=
10 remainder 2.
The remainder is subtracted from 11 to give the check digit: 11 – 2 =9
9becomes the check digit. Therefore the number willbe transmitted as1512113239
*NB: -
(1)If the check digit found is10,anXis used asthe check digit.
(2)If,upondividingthetotalby11andtheremainderis0,then0isthecheckdigit.
This is o btained as, 11-0=11. Divide 11 by 11 and take the remainder, which is 1
remainder 0, thus 0 becomes the check digit.
- llocate weights for digits from right going to the left, starting as 2.
A
- Multiply each digit with its weight and add them.
- Divide the total by its modulus (11 in our case) and get the remainder.
- Subtract the remainder from the modulus (11)
- The result will be the check digit.
- However,someauthorsgofurtherbysayingthat,dividetheanswer(obtained
after subtracting from 11) by its modulus (11) and take the remainder.The
remainder is the check digit.
( 1). Remove the given check digit, calculate your own check digit. If they are
similar,thenthecheckdigitiscorrect.Iftheyarenotsimilar,thenthegivencheck
digit is wrong.
Example:
ere, the check digit is o n position 1. So the numbers and their positions is as
H
follows:
Position 10 9 8 7 6 5 4 3 2 1
Digit 0 1 3 1 5 2 4 4 7 X
Compiled by: Kapondeni T. Cell:0772 245 866 Page77of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Multiply each digit with its position and add the results, thus giving:
(10x0)+(9x1)+(8x3)+(7x1)+(6x5)+(5x2)+(4x4)+(3x4)+(2x7)+(1x10) =132
Divide 132 by modulus (11) and get the remainder. This gives us 12 remainder 0.
B:Iftheremaindero btainedis0,thenthecheckdigitiscorrect,ifnot,thenthe
N
check digit is wrong.
Questions
Compiled by: Kapondeni T. Cell:0772 245 866 Page78of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
SOFTWARE
S oftware refers to a set o f instructions written in computer language that tell a
computertoperformaspecifictask,likeaddingaseto fnumbers.Withoutsoftware,
a computer will be useless. Software is grouped into systems software and
application software.The diagram below illustratesbranches/groups of software:
ystemsSoftware:Referstoprogramsthatcontrolandmanagestheperformanceo f
S
allcomputersystems.Systemssoftwarecompriseso f: (a) o perating systems (b)
Utility programs (c) Translators (d) Device drivers
Compiled by: Kapondeni T. Cell:0772 245 866 Page79of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- C ontrolovertheselectionando perationo finput,o utputandstoragedevices
o f the computer.
- Used for spooling
- Maintain user accounts
- Booting and properly shutting down the computer.
- File management
B: Household equipment like refrigerator do not have an o perating system since
N
the processor has o ne task to perform, no multiple devices and tasks to handle,
hence they are cheap.
* NB:Responsetime–thetimethatelapsesfromthemomentaninstructionisgiven
to the computer and the time that instruction is carried out.
urnaroundtime–thetimetakenfromthemomentadocumentisproducedbya
T
computer and the moment it is used as an input document to that computer again.
B. Most o perating systems are written in low level language. This is for them to
N
quickly coordinate computer activities since they will not be converted as they are
already in machine language o r less time is needed forconversioniftheo perating
system is written in assembly language. The following must be considered when
buying an operating system:
- Hardware type and computer design e.g. windows o perating system works
well on IBM compatible machines.
- Applications intended for the computer e.g. accounting, stock taking, etc.
- Method o f communicating with the computer, that is, use o f few o r many
peripherals and terminals.
- Method of operating the computer e.g. multi-access, multi-programming, etc
Compiled by: Kapondeni T. Cell:0772 245 866 Page80of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- The commands are difficult to learn and to use.
- Commands are difficult to master.
NB-ControlPrograms:Theseareprogramsthatmonitorhardwareo perationo nthe
computer.
- Monitor (supervisor) programs: - These are programs that supervise and
manage hardware and software elements of the computer
. Time sharing operating systems: This type o f o perating system allows many
2
users to use thesameprocessoratatime,usingtheroundrobinmethodbyuseo f
time slices. In Round Robin, eachuserisgivenafractiono fasecond(timeslice)to
use the processor so that all users seem not to be sharing the processor.
*NB: - Time slice: A brief period o f time during which a particular task (or
computer) is given control o f the microprocessor in a time-sharing multitasking
environment. A computer's processor is allocated to an application, usually
measured in milliseconds. Time slice is also calledquantum.
Multitasking: It istheconcurrentexecutiono ftwoo rmoreprogramso nthesame
computer by use o f time slices, doing the same job. For example, copying a graph
from Microsoft Excel to Microsoft Word. Thus the two programs will be running
concurrently, doing a related or same job.
. Multi Access / Multi user operating systems: It is when many o nline users
3
access one processor at the same time to make use of multi-programming.
. Multi-programming: This is whereby two o r more programs (tasks) are being
4
processed(run)atthesametimeo no necomputerbyuseo ftimeslices,forexample
playingmusicwhiletypingadocument.Programsmaytaketurnstomakeuseo fthe
processor, thus when o ne is using the CPU, o thers will be using the peripherals. It
uses interrupts to pass control from one program to another.
. Multiprocessing: A type o f o perating system that allows o ne computer to have
5
two or more processors but sharing the same memory, e.g. dual core computers.
.BatchProcessingSystem:-Asysteminwhichdataiscollectedoveralongperiod
6
o ftime,putingroupsandprocessedato nego,withoutuserinteractionfromstartto
finish,asinpayrollprocessing.Jobscanbeenteredataremoteterminal,thatis,o na
terminalfarawayfromthehostcomputer.ThusbatchprocessingpromotesRemote
JobEntry(RJE):whichistheenteringo fdataintothecomputerthroughaterminal
far away from the host computer.
- For instance, a central computer can process batches o f cheques collected from
different branches, mostly during the night. Ifthereareerrors,theresultswillalso
bewrong.Batchprocessingisverycheaptoo perateandeasytorun.Userscanalso
perform some other tasks while batch processing takes place.
- In batch processing, there is minimum o r no human intervention during data
processing period. It is used where large amounts o f data is processedandwhere
processing does not need to be done immediately, e.g. in Payroll processing,water
billing, electricity billing, telephone billing, clearance of cheques, etc).
ayroll Processing
P
These calculate wages and print payslips. It h the following inputs, processes and
o utputs:
Inputs: employee details (rate o f pay, tax code, bank name, bank account number,
etc), number of hours worked, over time, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page81of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
rocessing:Calculationo fGrossSalary,NetSalary,deductions,updatingmasterfile,
P
etc.
Outputs: printed payslips, updated master file, transferto bank account, etc.
illing systems
B
Usedtocreatebillsandinvoicestocustomers.Ithasthefollowinginputs,processing
and outputs:
Inputs: customer details (names, address, account numbers, etc), charge, previous
readings, new readings, bank account details, etc
Processing: calculating the number o f number o f total units, total cost, monthly
payments made, outstanding amount, etc.
Output: printed bill showing all details, updatedcustomer file, etc.
. Translators: - These are programs that convert source code to o bject code.
b
Translatorsareinthreeforms,whichareinterpreters,assemblersandcompilers.
These will be covered in more detail under Programming Languages.
c . Utility Programs:
Theseareprogramsusedtoperformspecific,usefulandfrequentlyneededtaskina
computer system. They usually have o ne single task to perform o n the computer
system. Utilities include the following:
i .VirusScanUtility:Theseareprogramsthatprotectcomputersfromvirusattacks,
for example Norton Antivirus, AVG, Avast, Esat NOD32, MacAfee, etc.
iii. Debuggers:These are utilities used for assistingin correcting errors in programs.
i v.DumpUtilities:Theseareprogramsthatassistincopyingdatafrommainstorage
to output devices and to other storage devices like the hard drive.
. Editors: These are programs used to make changes to data already held in the
v
computer.
i.PeripheralTransferUtility:Theseareprogramsusedtotransferdatafromo ne
v
peripheral device to another.
Compiled by: Kapondeni T. Cell:0772 245 866 Page82of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ii. System Status Utilities: These are programs that provide information o n the
v
state of files, memory, users and peripherals.
APPLICATION SOFTWARE
hisreferstoprogramsandtheirdocumentation,designedtoperformaspecifictask
T
for the user in daily life, like payroll processing, word processing, etc.
Integrated Package (Application suite) - a collection o f application programs
purchased as o ne package, for example MicrosoftOffice2010.Itisacollectiono fa
word processor, spreadsheet, database and presentation packages bought as o ne
package, for example, Microsoft Office 2010.
Compiled by: Kapondeni T. Cell:0772 245 866 Page83of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- T hey are tried and tested and therefore are free from errors.
- Documentation is always provided in form o f manuals, user guides and
tutorials that may be in soft or hardcopy.
- Training courses can be available from other end-users.
- Technical support is always available from other users and from the internet.
- Other users o f the package can be consulted before purchasing o r when a
problem occurs.
- Upgrades are always available every year or two.
- It is easy tosharefilesproducedbythesoftwarewitho thersaschancesare
they also have the software available to open the file
- sharingo ffileswitho therpackagesisusuallyeasiersincetheyarelikelytobe
compatible (e.g. ExcelandWord)
Compiled by: Kapondeni T. Cell:0772 245 866 Page84of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
* NB: A programmer is a person who specialises in designing, coding and testing
computer programs.
Software House is an o rganisation that specialises is developing software; this
includes both generic and tailor-made.
Special Purpose Application Software: - These are programs designed for o ne
specific business purpose, for example Pastel for accounting purposes.
Compiled by: Kapondeni T. Cell:0772 245 866 Page85of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- a bility to set the page size and page orientation (portrait/landscape)
- ability to change font style and font size (e.g.arial,courier, times new roman, etc.)
- ability to change margins (top, bottom and sides)
- page format (e.g. paragraphs, columns, etc.)
- importingtext,graphicsandpicturesintothedocumentbodyfromo therpackages
like Microsoft PowerPoint and Excel.
- inserting and deleting text
- cutandpaste/copyandpaste(topreventtheneedtore-typesectionso ftexto rto
move/remove text)
- search and replace words
- word wrap (e.g. auto adjust a line to fit into paragraph alignment such as straight
- file management (create/delete/move/search for files)
- headers and footers and the automatic numbering of pages
- graphics (embed drawings and graphs into the document)
- use macros
- merge (merge text files from one file into another e.g. mail merge)
- ability to send documents to a printer
- carry out a word count on the document
- add and manipulate tables in the main body of the document
- windows (edit 2 or more documents at the same time)
- WYSIWYG (what you see is what you get) – preview document to see how it will
look when printed
- spell checkers, language check and thesaurus
- Simple translation from o ne language to another; for example, from English to
French.
* NB:Editing:theprocesso fcorrectingmistakesinadocument,forexample,spelling
mistakes.
Formatting: making a document look more attractive by bolding, underlining,
inserting borders, etc
. Spreadsheet Packages: These are application programs used to manage and
2
analyse statistical, numeric and financial data, for example Microsoft Office Excel,
Lotus 1-2-3, SuperCalc, etc. The structure of a spreadsheet is as follows:
Compiled by: Kapondeni T. Cell:0772 245 866 Page86of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- U ses functions/ formulae to makecalculationso ndata.Thefunctionscanbe
user-defined or in-built functions
- Ability to inset boards on cells
- Can import and export text
- Can create graphs on given data, e.g. column graphs, pie charts, etc
- it is made up o f columns and rows; each row isidentifiedbyanumberand
each column is identified with a letter (or letters)
- can useAutofillfeature
- Eachcellisidentifiedbyitscolumnidandrowide.g.A4,ET300etc.Cellscan
be given as cell ranges, e.g A4: G4.
- a cell may contain a label (text entry such as Surname, Date OfBirth,..)o ra
value (which can be a number, a date, a formula, result o f a calculation, o r
currency)
- thecursoridentifiesthecurrentcellselected;itispossibletoclicko ntoacell
and a “+” sign appears in the bottom right hand corner; by dragging the
formula down it is possible toreplicateit in othercells
- etc……
. Database Packages (DBMS): Refers to programs used to create and maintain
4
databases for a specific application area.
They areusedformaintainingandprovidinginterfacebeenusersandthedatabase
and to interface the database and other application programs.
Examples o f database packages include Microsoft Office Access, Oracle, Dbase IV,
MySQL, etc
Compiled by: Kapondeni T. Cell:0772 245 866 Page87of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
roperties/features of databases
P
Most database packages have the following features:
(a) Tables:Theseareequivalenttofilesandthereforeareusedtostoredata.
The data is stored in rows and columns. Each row in a table is called a
record whichismadeupo fanumbero ffields(columnsinthetable).The
data type in the fields is usually either text, numeric o r date/time. Most
databasescontainanumbero ftableswhichareusuallylinkedtogetherin
some way.
(b) Forms: Forms are commonly called data entry screens since theyarethe
user interface which allows data in the tables to be viewed, entered o r
edited. Forms permit the control o f how o ther users interact with the
informationinthedatabasee.g.o nlyallowcertainfieldstobeseeno ro nly
allow certain o perations to be carried o ut . This subsequently helps the
protection of the information and also ensures it is entered correctly
(c) Reports: Reports are produced as a result o f questions such as
“date>=01/01/1975”. The data o n report is extracted from queries o r
tables as per user requirement. They display certain required data as
neededbytheuser,e.g.aftersearchingo rfilteringo fdata.Reportscanbe
printed o ut as hardcopy, o r viewed o n the screen o r exported (e.g. to a
word processor, an email message, etc.).
(d) Queries: Queries are questions that requestcertaindatafromtables,e.g,
Amount <200. It can also be aninstructiontosearchdatawhichmeetsa
certaincriteriafromtableanddisplayito nthescreeninformo fanother
tablecreatedfromtheo riginaltable.Mostcommonlyallowinformationto
be retrieved from tables. They also allow filtering so o nly the records
required are seen.
(e) Macros
A macro is a name o r key that represents a series o f commands o r key
strokes.Manyapplicationsallowsinglewordo rsinglenominatedkeyo na
keyboard to perform a whole series o f actions. Macros can be either
written as required and then storedo rstoredinalibraryforfutureuse.
Macroscanbeverysophisticatedandsavetheo peratoraloto ftime.For
example, the name and address in a word processor could be set upby
pressing key F1 and the system brings information from a related
database
.GraphicsPackages:Referstoprogramsusedtocreateandeditgraphs,diagrams,
5
drawings, charts and plans for buildings, for example Microsoft Paint, Harvard
Graphics, Corel Draw, Real Draw, etc. Computer graphics are images designed for
logos, commercial and news inserts during television advertisements o r
transmission.
.CommunicationSoftware:Theseareprogramsthatallowuserstocommunicate
6
o nnetworkedcomputersandtologo ntotheinternet,forexampleTCP/IPsoftware,
Client – server software, e-mails, etc.
*NB:-LogOn:toprovideausernameandpasswordfortheusertogainaccesstoa
computer or computer network.
.DesktopPublishing(DTP)Packages:Itisanextensiono fwordprocessorsthat
7
incorporates images and text for creation o fattractiveandprofessionaldocuments
for publication purposes. Examples o f DTP packages include Microsoft Publisher,
Compiled by: Kapondeni T. Cell:0772 245 866 Page88of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ageMaker and QuarkXPress. DTP is used tocreatebrochures,magazines,wedding
P
cards and newsletters.
Features of DTP include:
- They have a graphic program for inserting graphics in the document.
- They have a page composition program.
- They incorporate columns on one page.
- They have frames for positioning texts and graphics.
- They have templates used for recording document properties likepagesize,
margins, etc.
- They have style sheets used for making consistent main texts, headings and
subheadings.
. Authoring Packages (Authorware): Software that can be used to write
8
interactive, hypertext o r multimedia computer programs without the technically
demanding task o f computer programming. Also used in multimediapresentations.
These programs can be used for developing databases and material for Computer
Aided Instruction (CAI).
Authoring tools require lesstechnicalknowledgetomasterandareusuallyusedfor
applicationsthatpresentamixtureo ftext,graphics,andaudio/musicfiles.Authoring
Compiled by: Kapondeni T. Cell:0772 245 866 Page89of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
t oolsusuallyallowthecreationo ftheactualrequiredapplicationbylinkingtogether
objects which can be text, graphics, music file, etc. By defining the relationship
betweenobjectsit is possible to produce very usefuland eye catching applications.
( 10)SearchEngines:Thesearepackagesusedforsearchingdatafortheuserfrom
the internet, e.g. google, yahoo, etc.
* NB: - Specialist Packages for Business: These are packages for use in a specific
business environment, for example, Pastel for accounting purposes.
*NB:-Install:-toaddprogramstothecomputer.Thereforetouninstallistoremove
programs from the computer.
YPES OF SYSTEMS
T
1. Real Time Processing System: - An o nline system in which individual, discrete
transactions are processed as they o ccur to influence the activity currently taking
place,asinairlinereservation.Resultso ftheprocessareproducedimmediately.The
system response quickly and give feedback o f a request. Thus the system is
interactive in nature. Such systems include airline reservation systems, hotel
reservations, stock control, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page90of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- t hisusesrealtime(transaction)processingsincethefilesareupdatedinreal
time; interrogation of files will have access to totally updated information
.On-LineSystem:Asystemthatisdirectlylinkedtothehostcomputerforreal-time
3
communication and provides interaction between the user and the job, as in POS
terminals in supermarkets. In networked computers, theterminalsmustbedirectly
linked to the host computer. Examples include ATM systems in banks, airline
reservation systems. Online systems can just be for information retrieval.
Information retrieval systems are there for users to access certain information
promptly as o ntheinternet.Incontrast,offlinesystemsarecomputersystemsthat
work without being directly connected to the host computer.
.NetworkSystems:-Asysteminwhichprocessingiscarriedo utindependentlyin
4
more than o ne location but with shared and controlled access to some common
facilities like file storage.
. Automated Systems: - These are control systems that are dedicated to o ne
6
particular task and lack the ability to collect andanalysedataasindigitalcameras.
They do not allow for o r act o n user interaction, e.g. washing machines, cameras,
watches. Most control systems have embedded computers systems inside them.
Compiled by: Kapondeni T. Cell:0772 245 866 Page91of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ses in virtual reality training, etc.). A computer that can be referred to be a
u
multimedia system should have at least the following:
- a CD – ROM/DVD-ROM drive,
- speakers, large RAM size,
- large disk storage space,
- sound card
- video card and
- multimedia software like Windows Media Player and
- o ther software like sound drivers.
. Centralised systems: This is whereby processing is carried o ut at o ne central
9
locationforano rganisationwithanumbero fbranches.Usersino therlocationscan
view data and utilise it but withlimitedcapabilities. Centralisedprocessinghasthe
following advantages:
- Hardware within the organisation will be compatible and can be linked.
- The o rganisation gets better deals in terms o f maintenance contracts.
Employees do not have to learn new systems when they move from o ne
department (or branch) to another.
- It is easier to coordinate staff training courses using thesamesoftwareand
hardware for all departments (or branches).
- There is better control over use of unlicensed software.
- Data can be exchanged easily between similar types of hardware and software
Disadvantages of Centralisation:
- Requires highinitialcapitalinvestmento fsophisticatedequipment,o perating
systems, well developed communication systems and complex application
packages.
- Requires highly qualified and experienced personnel to run it.
- A system failure will paralyse the entire system unless expensive backup
system is provided.
- Users feel not being fully involved and therefore are not motivated.
Compiled by: Kapondeni T. Cell:0772 245 866 Page92of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Cost of hardware: o nline systems are more expensive to install, including
installation of communication systems like telephones and satellites.
-Volumeofdatainvolved:batchprocessingisappropriatewhereverylargedatais
handled.
-Frequencyofdatac hange:banksneedo nlinesystemsforcustomerdatachanges
more frequently than in payroll processing systems.
FILE HANDLING
ypes of files
T
1.MasterFile:Itisapermanentfilethatiskeptup-to-datebyapplyingtransactions
that o ccur during business o perations. It contains permanent (static) and
semi-permanent data.StaticdatastoredindatabasefilescanincludeSurname,First
names, Date of birth, etc.
2. Transaction Files: These are temporary files that contain data that can change
regularly, e.g. o n daily bases and it is used to update the master file. This includes
salesperday,studentmarkinaweeklytest,etc.Transactionfilesareusedtoupdate
master files.
3.Referencefiles:Thesearefilesthatcontainpermanentdatawhichisrequiredfor
referencing (viewing) purposes o nly.Thisincludesdatao ntaxbands,formulae,etc.
No changes to files are done.
4. Data file:A set of related records (either writteno r electronic) kept together.
When entered into the database, the record will appear as follows:
Compiled by: Kapondeni T. Cell:0772 245 866 Page93of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
B:-*Indicates the end of field marker, and the≈indicates the end of record marker
N
Variable length records have the following advantages:
● Theyaremoreeconomicalintermso fusageo fdiskstoragespaceastheydo
not allow spaces to lie idle.
● Data entered will not be cut but appears as entered no matter how long it is.
● may reduce time taken to read file/transfer data
● enables as many fields as possible to be added to a file
ile Organisation
F
Refers to the way in which records inafilearestored,retrievedandupdated.This
affects the number o f records stored, access speed and updating speed. The most
commonmethodso ffileo rganisationare:SerialFileOrganisation,SequentialFile
organisation, indexed – sequential file organisation and random (direct) file
o rganisation.
Compiled by: Kapondeni T. Cell:0772 245 866 Page94of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
. Sequential File Organisation: This is whereby records are sorted into a key
2
sequence, that is, in ascending o r descending o rder o f a given key filed as o n
magnetic tapes. Sequential files o rganisation is appropriate for files with ahighhit
ratelikepayrollprocessing.Theyaresuitableformasterfilessincetheyareo rdered.
However, it takes too long to access records towards the end o f the file since the
records are accessed by reading from the first record until the required data is
found.However,searchingo frecordsatthebeginningo ffilesisveryfast.Addingo f
newrecordsisdifficultasthisisdonebyre-enteringthedataandthenewrecordis
insertedatitsrightposition.Itistimeconsumingtoupdatesuchrecords.Suitablefor
masterfilessincerecordsaresorted.Thisisusedwhereallrecordsneedprocessing,
e.g payroll.
Sequential Files promote sequential Access: Sequential Access iswherebyrecords
areretrievedbyreadingfromthefirstrecorduntiltheneededrecordisfoundinan
o rdered list o f records, e.g. o n magnetic tape. Sequential access o ccurs where
records are ordered using a key field.
. Indexed-Sequential Files: This is whereby records are o rdered in sequence
3
based o n the valueo ftheindexo rdiskaddressassupportedbyharddisks.Thisis
usedforstoringmasterfilesrecordssincetherecordsareo rdered.Itisalsosuitable
for real time processing applications like stock control as it is fast in accessing
records and in updating them. It provides direct access to data as o n hard disks,
diskettes and compact disks.
.Random(Direct/hash/relative)FileOrganisation:Thisiswherebyrecordsare
4
storedinnoo rderbutaccessedaccordingtotheirdiskaddresso rrelativeposition,
as supported by hard disks and compact disks. The address o f the record is
calculatedusingthehashingalgorithm.Itisappropriatewhereextremelyfastaccess
todataisrequiredasinairlinereservation.Updatingo frecordsisinsitu,verysimple
and very fast. Hard disk, compact disks and diskettes promotes random file
o rganisation.
Random File o rganisation promotes Random/Direct Access to records: Direct
access is hereby records are retrieved randomly by going straight to the needed
recordbyusingaddresso fdata,assupportedbyharddisks,compactdisks,memory
sticks, etc.
ile Processing
F
Refers to any form o f activity that can be done using files. This includes: file
referencing, sorting, maintenance and updating.
Compiled by: Kapondeni T. Cell:0772 245 866 Page95of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
.FileReferencing/Interrogation:Thisinvolvessearchingo frecordanddisplaying
1
it o n the screen in o rder to gain certain information, leaving it unchanged. The
record can also be printed.
2. Sorting: Refers to a process o f arranging (organising) records in a specific
o rdered sequence, like in ascending or descending order of the key field.
3. Merging Files : This is the process o f combining two o r morerecordsintoo ne.
Below is an example of how records can be merged:
Record A (sorted) Record B (unsorted)
12 34 71 78 101 103 67 3 90 12
Record C (Merged and sorted for records A and Record B)
3 12 34 67 71 78 90 101 103
4. File maintenance: This is the process o f reorganising the structure o f records
andchanging(addingo rremovingo rediting)fields.Thiscanbeduetochangesdue
to addition or deletion of records.
5. File Updating: Updating is the process o f either adding new record, deleting
unwanted records o r modifying existing records. It involves making necessary
changes to files and records. Mostly master files are updated and they must be
up-to-date (contain accurate and most recent information).
For updating to occur, any one of the following must have occurred:
● A new record has been entered.
● Deletion of an unwanted record.
● An amendment (change) to the existing data has been made, e.g. change in
date of birth only.
hemostcommonmethodsoffileupdatingare:UpdatinginsituandUpdatingby
T
copying.
. Updating by copying
a
Thishappensinsequentialfileupdatingprocess.Thisisdonethroughthefollowing
steps:
- A record is read from master file into memory.
- A record is read from transaction file into memory.
- Record keys from each file are compared.
- If record keysarethesame,themasterfileisupdatedbymovingfieldsform
transaction file to the master file.
I n sequential file updating, it is recommended to keep at least three master file
versionsthatwillbeusedfordatarecoveryincaseo fasystemfailureo raccidental
losso fdata.ThefirstmasterfileiscalledtheGrandfatherfile,thesecondmasterfile
is called the father file and the third master file is the sonfile.Thisrelationshipis
called the grandfather-father-son version o f files. The process of keeping three
versions of master files ( grandfather-father-son) as a result of sequential file
updatingisc alledFileGenerations. Thusthefirstmasterfile(grandfatherfile)is
calledthefirstgenerationfile,thesecondmasterfile(fatherfile)iscalledthesecond
generation file and the third master file (son file) is the third generation file. The
following diagram illustrates the sequential file updating process:
Compiled by: Kapondeni T. Cell:0772 245 866 Page96of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
* NB: - Always create data
backups o n compact disk o r
hard disks and re-run the o ld
master file with the transaction
file if the computer systemfails
o r if data is lost. This is a data
recovery method that works
well.
PROGRAMMING CONCEPTS
efinition of terms:
D
-Program:aseto fdetailedandunambiguousinstructionsthatinstructsacomputer
to perform a specific task, for example, to add a set of numbers.
- Programming: A process of designing, coding andtesting computer programs
- Programmer: Apersonwhospecialisesindesigning,codingandtestingcomputer
programs
-Problem:anyquestiono rmatterinvolvingdifficultyo runcertaintyandisproposed
for solution.
rogramming Languages
P
A programming language isaseto fsymbolsincomputerlanguagethatareusedin
codingcomputerprograms.Aprogramminglanguageisaspeciallywrittencodeused
for writing application programs e.g C, Pascal, COBOL, BASIC, C++ and Java.
. Low Level Languages (LLL): These are programming languages used to write
1
programsinmachinecode,thatisinzerosando neso rinmnemoniccodes.Lowlevel
language is in two forms:Machine LanguageandAssemblyLanguage.
Compiled by: Kapondeni T. Cell:0772 245 866 Page97of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
.MachineCode(Language)isthelanguageusedtowriteprogramsinbinaryform
a
(zeros and ones). Machine language has the followingadvantages:
(i) Programs run faster since they are already in computer language. There is no
need for conversion as programs are in machine language.
(ii) Programs occupy very small disc storage space by storing just 1s and 0s.
.AssemblyLanguage:Theseareprogramminglanguagesthatusemnemoniccodes
b
in coding programs. Mnemonic codes are abbreviations used in coding assembly
language programs, for example, LDA for Load, ADD for Addition, etc. Mnemonic
codes are very close to machine code, hence are low level language assembly
language codes
Advantages of Assembly language:
● One assembly language instruction corresponds to o ne machine code
instruction and therefore translation is easier and faster.
● Programs run faster since they are close to machine code.
● They occupy very small disk storage space hence are economical to use.
● Easier for a programmer to use than machine language.
. High Level Languages (HLL): These are programming languages that use
2
English-like statements in coding programs, for example COBOL, Pascal, BASIC, etc.
There are so many high level languages because each language is designed for a
specificproblemtobesolvedino urdailylives.ForexampleBASICwasdesignedfor
learning purposes, COBOL for business applications, FORTRAN for scientific
purposes, etc. Below is an example o f a BASIC program that accepts two numbers
entered through the keyboard, adds them and display the result on the screen:
INPUT “ENTER FIRST NUMBER.”, A
INPUT “ENTER SECOND NUMBER.”, B
SUM = A + B
PRINT SUM
END
rogramswritteninHighLevelLanguagearefirstconvertedtomachinecodebefore
P
running.
Compiled by: Kapondeni T. Cell:0772 245 866 Page98of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● T hey are easier to understand since they are written in English-like
statements which are more readable.
● They are easier to learn.
● It is easier to work with, that is to correct errors and to test programs.
● They areproblemo rientedandthereforecanbeusedo nanycomputer(not
machine dependent)
Disadvantages of HLL
● Takes long to run since they need to be first converted to machine code.
● They occupy a lot of disk storage space as compared to low level languages.
ranslators
T
Theseareprogramsusedtoconvertsourcecodeintomachinecode,andareintwo
types, which are interpreters, compilers and assemblers, which are further
explained below:
. Interpreters
1
Theseareprogramsthatconvert(translate)andruno neinstructiono faprogramat
a time before going to the next, until the end o f the program, e.g. the BASIC
interpreter. They do not produce the machine code version o f a program; hence
conversion is repeated when you run the program again. Thus interpreters retain
source code. The interpreter must be present in the computer for the program to
run.
Functions of Interpreters
● They check syntax error in a program statement.
● Theytranslateaninstructionintomachinelanguageandrunitbeforegoingto
the next.
● Allocates storage space to variables.
Advantages of interpreters
● It is easy to find and correct syntax errors in interpreted programs.
● It is very fast to run programs for the first time.
● It is very fast to run small programs.
Disadvantages of interpreters
● They are very slow in running very large programs.
● They do not produce an o bject code o f a source codeandhencedifficultto
use.
● The interpreter must be present in the computer for the program to run.
. Compilers
2
These are programs that convert a high level language program into its machine
codeequivalentato negoandthenrunit,e.g.theCOBOLcompiler.Thusittranslates
the entire program before running it.Oncecompiled,theprogramnolongerneeds
conversion since the machine code version is the o ne that will be run, until some
Compiled by: Kapondeni T. Cell:0772 245 866 Page99of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
c hangesaremadetotheprogramcode.Thusacompilerproducesano bjectcodeo f
the program. The computer must have a compiler for translation.
Functions of Compilers
● They check syntax errors in program statements.
● They allocate storage space to variables.
● Translate the whole program into machine code at one go.
● Run an object code of the program.
● Produces a program listing which indicates position of errors in a program.
Advantages of Compilers
● Compiled programs runs faster since the object code is run.
● Compilers indicate the line numbers with syntax errors andthereforeassist
programmers in debugging programs.
● They are appropriate even for very large programs.
Disadvantages of Compilers
● Slower than interpreters for running programs for the first time.
● The compiler must be present for the translation process to occur.
● They can cause the computer to crash.
● Difficult to find errors in compiled program.
* NB: Source Code refers to the program written in English-like statements (High
Level Language) by the programmer.
ObjectCodereferstoamachinecodeversiono fasourcecode.Allprogramswritten
in source code must be converted to o bject code for the computer to understand
them.
.Assemblers:Theseareprogramsusedtoconvertassemblylanguageinstructions
3
into machine language. Other uses of assemblers include:
● They generate machine code that is equivalent to assembly language.
● Theyareusedtocheckthevalidityo finstructions,thatis,checkingforsyntax
errors in an instruction.
● They also assign memory locations to variables.
Compiled by: Kapondeni T. Cell:0772 245 866 Page100of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
umber, Add, Divide, Subtract and to Display Results. Modules are also called
N
procedures, routines, sub-routines o r functions. The splitting o f a problem into a
series of self-contained modules is called modularisation (modular programming).
Advantages of modularisation (modular programming)
● Programmer can concentrate at one task at a time.
● Modules are simpler and easier to understand and to solve.
● Modules are easier to test and to debug.
● Program modification is easier since changes are isolated with specific
modules.
● More experienced programmers can be assigned complex modules.
● It saves programming time by sharing tasks.
● A large project will be easier to monitor. It is easier to update (modify)
modules
However,
● It may be difficult to link the modules together.
● Therecouldbeproblemso fusageo fvariablesassimilarvariablenamesmay
be referring to different sets of data. They may also vary in scope.
* NB: Library programs: this refers to a collection o f standard programs and
subroutinesthatarestoredandavailableforimmediateusebyo thermodulesinthe
system. Library programs are referenced by most modules in the systems.
*NB: Stepwiserefinement:atechniqueusedindevelopingasystembybreakingit
into modules and then work on the internal working of a module.
*NB: The difference between a procedure and a function is that a procedure is a
sub-program that do not return a value while a function is a sub-program that
returns a value.
LGORITHMS
A
A set o f instructions describingthestepsfollowedinperformingaspecifictask,for
example, calculating change. Algorithms are not necessarily written in any specific
language. Algorithms can be illustrated using the following:
Descriptions, Flowcharts, Pseudocodes, Structure diagrams.
Advantages of algorithms
- not biased towards any programming language
- easy to convert to a program code or flowchart
- easy to determine logic errors
- has finite steps which lead to a solution
Disadvantages
- time consuming to design, i.e. first convert to flowchart, then to program code
- most people find them difficult to learn
.Descriptions:Thesearegeneralstatementsthatarefollowedino rdertocomplete
a
aspecifictask.Theyarenotgovernedbyanyprogramminglanguage.Anexampleis
as follows:
Enter temperature inoC
Store the value in box C
Calculate the equivalent temperature inoF
Store the value in box F
Print the value of box C and F
End the program.
Compiled by: Kapondeni T. Cell:0772 245 866 Page101of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
.Pseudocodes:TheseareEnglish-likestatements,closertoprogramminglanguage
b
that indicate steps followed in performing a specific task. They are however
independent of any programming language. An example is as follows:
Enter centigrade temperature, C
If C = 0, then stop.
Set F to 32 + (9C/5)
Print C and F
End
ARIABLES
V
Definition: A variables is amemorylocationthatcanstoreavaluethatcanchange
during program execution.
Naming variables: Each programming language has its own way o f naming
variables. However, the following conventions are common:
- a variable should notbeareservedword.Areservedwordisawordwitha
specificmeaning/functioninthatprogramminglanguage,e.g.Print,else,are
reserved words in BASIC
- Variables must start with an alphabetic character, not with digit.
- It is wise to name a variable using the data it stores, e.g. surname (to store
surnames), DOB (to storeadateo fbirth),etc.Thusitmustbemeaningfulto
avoid confusion
- Must not be too long
- Must be one word
i . Simple sequence: This is whereby instructions are executed in the o rder they
appearinaprogramwithoutjumpinganyo neo fthemuptotheendo ftheprogram.
Statements are executed o ne after another in the o rder they are. It is simple and
avoids confusion. Example:
Enter first number, A
Enter second number, B
C = A + B
Print C
Stop
ii. Selection Structure:
This allowso netochoosetheroutetofollowino rdertoaccomplishaspecifictask.
Selection is written using the IF ....THEN...ELSE statement or the CASE statement.
I F...THEN ...ELSE statement: A programming structure that allows the user to
choose o ne from at least two routes o f solving a problem. The following
Pseudocodescomparestwonumbersenteredthroughthekeyboardanddetermines
the bigger one.
Compiled by: Kapondeni T. Cell:0772 245 866 Page102of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
nter first Number, A
E nter first Number, A
E Enter first Number, A
Enter second number, B Enter second number, B
Enter second number, B
IF A>B THEN IF A > B THEN
Print A is bigger Print A is bigger IF A>B THEN Print A is bigger
ELSE ENDIF
IF A<B THEN Print B is bigger
IF A<B THEN IF A < B THEN
Print B is bigger Print B is bigger IF A=B THEN Print Numbers are equal
ELSE ENDIF
END
Print Numbers are IF A = B THEN
equal Print Numbers are equal
ENDIF ENDIF
ENDIF END
END
The above 3 Pseudocodes produces the same result.
ASE Statement: This is an alternative to the IF...THEN...ELSE statement and is
C
shorter. For example:
Enter first Number, A
Enter second number, B
Enter operand (+, -, * /)
CASE operand of:
“+”: C = A + B
“-”: C = A-B
“*”: C = A*B
“/”: C = A/B
ENDCASE
Print C
END
I ii. Repetition/Iteration/Looping:
Acontrolstructurethatrepeatedlyexecutesparto faprogramo rthewholeprogram
until a certain condition is satisfied. Iteration is in the following forms: FOR...NEXT
loop, REPEAT... UNTIL Loop and the WHILE...ENDWHILE Loop.
.For...NextLoop:Aloopingstructurethatrepeatedlyexecutestheloopbodyfora
a
specified number of times. The syntax of the For...Next loop is as follows:
groupo fstatementsbetweentheloopingstructuresiscalledtheloopbodyandis
A
the one that is repeatedly executed.
Compiled by: Kapondeni T. Cell:0772 245 866 Page103of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
he For...Next loopisappropriatewhenthenumbero frepetitionsisknownwellin
T
advance, e.g. five times.Anexampleo faprogramthatusestheFor...Nextloopisas
follows:
Sum, Average = 0
FOR I = 1 to 5 DO
Enter Number
Sum = Sum + number
NEXT I
Average = Sum/5
Display Sum, Average
End
.Repeat...UntilStructure:Thisisaloopingstructurethatrepeatedlyexecutesthe
b
loop body when the condition set is FALSE until it becomes TRUE. The number o f
repetitionsmaynotbeknowninadvanceandtheloopbodyisexecutedatleasto nce.
The syntax is as follows:
Repeat
Statement 1
Statement 2 loop body
................
Until {Condition}
For example
Sum, Average, Count = 0
Repeat
Enter Number (999 to end)
Sum = Sum + Number
Count = count + 1
Until Number = 999
Average = Sum / count
Print Sum, count, Average
End
In the above program:
- Countrecords the number of times the loop body executes.
- 999 is used to stop further data entry through the keyboard and thereby
ending the loop. Such a value that stops further data entry through the
keyboard thereby terminating a loop is called aRoguevalue or sentinel.
- Theconditionhereis{Number=999}.Theloopexitswhenthenumber999
isentered.If999isparto fthenumbertobeenteredinthisprogram,thenthe
user has tosplititintotwonumbers,thatis999=990+9,thereforecanbe
entered separately as 990 and 9.
- A flag is also used to control the loop. In this case 999 is also a flag.
NB.AsfortheRepeat...Untilloop,theconditionistestedaftertheloopbodyhasbeen
run at least o nce, even when the condition is true from start. This is rather
misleading.
c .While...DoStatement:Aloopingstructureinwhichtheloopbodyisrepeatedly
executedwhentheconditionsetisTRUEuntilitbecomesFALSE.Itisusedwhenthe
number o f repetitions is not known in advance. The condition set is tested first
before execution o ftheloopbody.Thereforetheloopbodymaynotbeexecutedat
all if the condition set is FALSE from start. The syntax o f the WHILE…END WHILE
structure is as follows:
Compiled by: Kapondeni T. Cell:0772 245 866 Page104of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
WHILE {condition}
Statement 1
Statement 2 loop body
................
ENDWHILE
he word WEND can be used to replace the word ENDWHILE in some structures
T
and therefore is acceptable. The wordDo, after theconditionis optional.
c . Flowcharts
It is a diagram usedtogivedetailso nhowprogramsandproceduresareexecuted.
Flowcharts are drawn using specific symbols, each with its own meaning, as given
below:
Symbol Explanation
Process Symbol - Indicates where some form of processing occur
rrow
A - Shows directional flow of data (data flow symbol)
Input /output - Parallelogram in shape. Indicates where data is
entered and o utput form, either screen displayo r
printout.
Terminal - Oval in shape. Indicate the start and stop o f a
program. Therefore it is written either
Start/Begin/Stop/End.
Connector - Circular in shape.Denotesthestartandendo fa
subroutine. Nothing should be written inside it.
Pre-defined process Indicates a module/subprogram/procedure inside
another program
Compiled by: Kapondeni T. Cell:0772 245 866 Page105of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Decision epresents a selection stage. Often used where a
R
condition is, especially in repetition and selection
structures.
lowchart equivalent
F to the
pseudocode on the right
. Using Iteration
3
(a) Repeat ... Until Structure
Compiled by: Kapondeni T. Cell:0772 245 866 Page106of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Flowchart seudocode equivalent
P
Sum, Average, Count = 0
Repeat
Enter Number
Sum = Sum + Number
Count = count + 1
Until Count > 10
Average = Sum / count
Display Sum, count, Average
End
Compiled by: Kapondeni T. Cell:0772 245 866 Page107of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
se of the Pre-defined Symbol and the connector
U
This is used when drawing flowcharts of subprograms as given below.
Start Module Accept
Numbers
Enter First Number, A
Enter Second Number, B
Enter Third Number, C
End Module
lowchart (a) above indicates modules named Accept Numbers, Add numbers
F
Multiply Numbers and Display Results. Flowcharts for individual modules canthen
be designed as given in diagram (b) above, o nly the first module is indicated. Can
you do the rest?
he structure diagram above indicates five sub-programs o f the program Process
T
Numbers, namely Initialise, Accept Numbers, ProcessNumbers,DisplayResultsand
Exit. The module Process Numbers has its own sub-programs, which are Add
Numbers and Multiply Numbers. Modulesareappropriateforverylargeprograms.
Canyouwritepseudocodeforindividualmodules?Theprogramcanbewrittenasa
continuous single program as indicated on the right side of the diagram.
Compiled by: Kapondeni T. Cell:0772 245 866 Page108of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ebugging: The process o f finding and correcting errors in a program. Bugs are
D
errorsinaprogram.Adebuggerisaprogramusedinaidingthefindingandremoval
o f errors in a program.
rogramming Errors
P
Programming errors are grouped into:
i.Syntaxerror:thisisanerroro fviolatingthegrammaticalrulesgoverningsentence
constructioninacertainprogramminglanguage,forexample,leavingasemi-colonat
theendo feachlineinPascal.Syntaxerrorsaredetectedbythecomputer.Aprogram
cannot run with syntax errors.
ii. Logic error (Semantic error): refers to an error in the sequencing o f
instructions, modules and specifying wrong formulaethatwillproduceundesirable
results. For example, instructing the computer to display result before any
processing has been done. Logic errors cannot be detected by the computer. The
user just finds wrong and unintended results of a process.
iii. Runtime (execution) error: These are errors that o ccur during program
executionandcanbegeneratedwhenthecomputertriestoreadpastanendo ffile
marker or by dividing a number by zero.
ATA TESTING
D
After a program has been coded, it must be tested with different data types to
determine if intended results are produced.Thetypeso ftestdatathatcanbeused
include:
i.ExtremeData(boundarydata/borderlinedata):Referstotheminimumandthe
maximum values in a given range. For example, a computer program requires the
user to enter any number from (between) 1 to 20.1and20areextremedataand
the computer must accept these. Thus extreme data is accepted by the computer.
ii.Standard(normal)Data:Thisreferstodatathatlieswithin(in-between)agiven
range. In o ur example above, the numbers from2to19arestandarddataandare
accepted by the computer.
iii. Abnormal Data: This refers to data o utside a given range. As to o ur example
above,thenumber0,-1,-50andallnumberfrom21andaboveareabnormaldata.
The computer system gives/displays an error message if abnormal data is entered.
esting Strategies
T
First step involves testing of the programs and various modules individually, e.g.
-Top-Down testing: program is tested with limitedfunctionality. Most functions are
replaced with stubs that contain code. Functions are gradually added to the program
until the complete program is tested.
-Bottom – up testing: Each function is tested individuallyand then combined to test
the complete program.
-Black-box testing:
- Program is regarded as a black box and is tested according to its specification.
- No account is taken of the way the program is written
- Different values are entered for variables to determine whether the program
can cope with them. This includes standard (typical/normal), extreme
(borderline) and abnormal data values.
-White-box testing:
Compiled by: Kapondeni T. Cell:0772 245 866 Page109of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● E ach path through the program is tested to ensure that all lines of code work
perfectly.
● Involves testing the program to determine whether all possible paths through
the program produce desired results
● Mostly appropriate if the program has different routes through it, i.e. uses
selection control structure and loops
● Involves testing of logical paths through the code
● Involves testing of the structure and logic of the program (if it has logical
errors)
● Involves desk checking (dry running)
-Alpha testing:
● The first testing done within the developers company (at owners’ laboratory).
● Testing is done by members of the software company
● Some errors may still be in existence after alpha testing as the testers are
programmers not users.
● The software version will be unfinished
● Testers have knowledge of the software and of programming
-Beta testing: System testing done after alpha testing;in which the program version
is released to a number of privileged customers in exchange of their constructive
comments. Mostly similar to the finally released version.
ystem testing
S
Once a program is tested, it is installed and the analyst can now test it. A very large
program must be tested using the following types of tests:
Compiled by: Kapondeni T. Cell:0772 245 866 Page110of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Help is available.
●
● Can use menus, wizards, sound and colour to assist the user.
Userfriendlyprogramsusuallydisplaywindows,icons,menus,pointersanddialogue
boxes.
Advantages of GUI:
● It is faster to give/select commands by just clicking.
● It is easier for a novice (beginner) to use the system right away.
● Itisuserfriendly(thisisaninterfacethatiseasytolearn,understandandto
use).
● There is no need for users to remember commands of the language.
● It avoids typing errors since no typing is involved.
● It is easier and faster for user to switch between programs and files.
● A novice (beginner) can use the system right away.
Disadvantages of GUI:
● Theiconso ccupyaloto fdiskstoragespacethatmightbeusedforstorageo f
data.
Compiled by: Kapondeni T. Cell:0772 245 866 Page111of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● ccupy more main memory than command driven interfaces.
O
● Run slowly in complex graphics and when many windows are open.
● Irritate to use for simple tasks due to a greater number of operations needed.
● Usually only predefined choice are available.
he user has to remember the commands to be typed when performing aspecific
T
task.Anexampleo faprogramthatusescommanddriveninterfaceisMicrosoftDisk
Operating System (MS-DOS). The commands areabbreviatedandshorte.g.Del(for
delete), copy, print, etc.
Command Line interface is ideal for programmers and technically competent
personnel.
Advantages of Command Driven Interface:
● It saves disk storage space since there are no icons involved.
● It is very fast in executing the commands given o nce the user mastered the
commands.
● It saves time if the user knows the commands by heart.
. Menu Driven Interface: This type o f interface displays a list o f o ptions /
3
commandsfromwhichtheuserhastochooseo nebyuseo fthemouseo rkeyboard.
Below is an illustration of a menu driven type of interface:
1. PRINT RECORD
2. DISPLAY RECORD
3. DELETE RECORD
4. EDIT RECORD
5. MY OPTION IS: __
Compiled by: Kapondeni T. Cell:0772 245 866 Page112of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● No need to consult manual
DATABASES
Database is a collection o f related and o rganised filessharableamongcomputer
A
users o f an o rganisation. Databases enable addition, deletion and modification o f
data held in the computer.
- Field:Aspecificcategoryo finformationinatable
(database), for example Surname, Date of Birth, etc
- Record:Acollectiono frelatedfieldsdescribingan
entity, e.g patient.
database system (elements) is made up o f stored data, software to maintain the
A
database, procedures and the person working with the database.
Compiled by: Kapondeni T. Cell:0772 245 866 Page113of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
atabase Management System (DBMS)
D
Itisalayero fsoftwareusedtocreate,maintainthedatabaseandprovidesinterface
between the database and application programs. It allocates storage to data. The
DBMSmaintainsdataby:addingnewrecords,deletingunwantedrecords,amending
records.
Data in databases can be accessed using different programming languages.
DBMS facilities:
● Processing of files in serial or sequential order.
● Processing of records.
● Retrieval of records
DBMS provides security to data in the database by:
● Protecting data against unauthorised access using passwords.
● Safeguarding data against corruption.
● All transaction between the database and the user are done through the
DBMS.
Compiled by: Kapondeni T. Cell:0772 245 866 Page114of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
elational databases o rganise data in a flexible manner. They are also simple to
R
construct and are easy to use. However, it may be difficult to come up with
relationships.
From the above database structure, it can be noticed that:
-TherearethreerecordsforKapondeni,TurugariandMoyo.Arecordisalsocalled
atuple.
- There are four fields: Student Number, Surname, First Name and Date of Birth.
- The student Number is used as a Primary Key (Key field) because it gives a
unique(one)record.Aprimarykeyisafieldthatisusedtoidentifyauniquerecord
from adatabase.Allo therfieldsfromtheabovedatabasearenotappropriatefora
key field because they can identify more than o nerecord.Thatissurnamescanbe
similar for 2 or more people as well as date of birth.
*NB: Concatenated key: the combination o f two o r more fields in a database in
o rder to identify a unique record, e.g. using the Surname, First Name and Date o f
Birth in search of one record.
*NB: Secondary Key: A field usedtoidentifymorethano nerecordatatime,e.g.a
surname.
*NB:Attribute: A characteristic of a record, e.g.its surname, date of birth.
Entity:anyo bjecto reventaboutwhichdatacanbecollected,e.g.apatient,student,
football match, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page115of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
hese databases have linksthat
T
are used to express
relationships between different
data items.
.Hierarchicaldatabase:Thesearedatabasesinwhichrecordsaresubordinatesto
3
o ther records in a tree structure o f database. It promotes grandfather, father, and
son relationship of records as illustrated below..
herearenocrosslinkageso ffile
T
records.
I t is difficulttoaccessallthefiles
at one time.
Advantages of Databases
● Validationchecksaremadeo ndataduringentrytherebyreducingdataentry
errors.
● Searching and retrieval of data is very fast.
● Less likelihood of data getting lost.
● Record structure can be easily modified if the need arises.
● Files can be linked together making file updating easier and faster.
● Avoids/reduces data redundancy.
● Data can be secured from unauthorised access by use of passwords.
● Users can share data if the database is networked.
● Duplication of records is eliminated.
Compiled by: Kapondeni T. Cell:0772 245 866 Page116of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
A
● d hoc reports can be created easily.
● Sorting of records in any order is very fast
Disadvantages of databases
● If the computer breaks down, you may not be able to access the data.
● It is costly to initially setup the database.
● Computer data can be easily copied illegally and therefore should be
password protected.
● Takes time and costs to train users of the systems.
● Expensive to employ a database administrator who will manage the database
latfile:thisisa2-dimensionalfile,comprisingo frowsandcolumns,thatareused
F
to store data, e.g. in a spread sheet. A flat file has the following weaknesses:
- Data is not sharable among users
- Too much duplication of records
- Too much data redundancy
- Difficult to manage
owever,theintroductiono fthecomputersystemsmeansthatstaffwouldneednew
H
skills,canleadtounemployment,peoplearelikelytoworkfromhome,couldleadto
de-skilling and some health problems will suffice.
ample Question
S
A database stores details about carsinashowroom:Thedatabaseinformationcan
be amended, deleted or new ones inserted due to:
Amended: information in the databases is incorrect. Price o f vehicle needs to be
changed (e.g. sales). Change of vehicle colour.
Deleted (record deleted): Vehicle is sold or Vehicleis scrapped
Inserted/ added: new vehicle arrived. More information about current vehicle
becomes known.
ODING DATA
C
Data to be entered into the computer can be coded / written in a short way, for
example:
Indatabases,afieldforsexcanbecodedasfollows:FforFemale,MforFemale.In
thiscasetheuserjustentersFo rMandnotthewholefieldasitis.Thecolumnfor
colour can also be coded as B for Black, R for Red, Y for Yellow, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page117of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● Increases the speed of searching and any process performed on data
Features of Codes
● Should be of the same length.
● Must be easy to use.
● Must not be too short in case you will run out of codes.
● Codes are often unique
. Interrupts: An interrupts is a signal send to the processor by a peripheral for
2
attentiontobeturnedtothatperipheral,therebycausingabreakintheexecutiono f
a program, e.g. printer out of paper. Examples/types of interrupts include:
✔ Input / output interrupte.g. disk full, printer outo f paper, etc.
✔ Arithmetic and Logic Unit error.
✔ Clock (happens normally in time sharing systems where the clock transfers
control from one computer to another.)
✔ Program Interrupts:Arithmetic overflow, divisionby zero, etc
✔ Hardware Failure: can be caused by power failure ormemory
parity error
I f two devices interrupt the processor at the same time,interruptprioritieswillbe
used. That is, an interrupt with a higher priority is handled first than that with a
lower priority.
.Polling:Aprocesswherebytheprocessorinterrogatesperipheralstodetermineif
3
theyareinacertaincondition(orarepresent).Pollingcantakeplaceduringbooting,
wheretheprocessorcheckstheconnecteddeviceslikekeyboard,mouse,harddisks,
etc.Italsoo ccursintime-sharingsystemswheretheprocessorchecksiftheterminal
has anything that needs processing.
Compiled by: Kapondeni T. Cell:0772 245 866 Page118of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
. Handshaking: It is the exchanging o f signals to establish communication link
5
betweentwodevices/computers,forexamplemodemandcomputer.Itisaprotocol
for establishment o f a link between two communicating devices. This controls
movement o f data between the computerdevices,e.g.modems.Thedeviceengages
in something like a dialogue to acknowledge receipt o f data. Can also be called
Three-Way Handshakeprocedure
* NB: Directory: - a folder used to store o ther folders and files in a hierarchical
structure. Directories are usually created in MS-DOS systems.
MALWARE
alware (malicious software) is code o r software that is specifically designed to
M
damage,disrupt,stealo rinflictsomeo ther“bad”o rillegitimateactiono ndata,hosts,
o r networks.
Types Of Malware
1. WORM
Compiled by: Kapondeni T. Cell:0772 245 866 Page119of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
maliciousprogramcapableo freproducingitselfandspreadfromo necomputerto
A
the next overanetworkandconsumecomputerresourceslikememoryandCPU.It
does not delete files as viruses do. Worms travel unaided through the computer
network. It does not require a host file or human assistance for it to spread.
hesearemaliciousprogramsthatappearsasprogramsusefultotheuserwiththe
T
intention o f soliciting information like user accounts and passwords o r damaging
computer system files and desktop settings. It can also allow o theruserstoaccess
confidential information from your computer. They do not self-replicate.
. COMPUTER VIRUSES
3
A computer virus is a malicious program which attaches itself to computer file,
replicatesitself,damages,destroyso rcorruptsfilesandmemoryo fthecomputer,for
example, boot sector viruses. Computer viruses spread withhumanaction,e.g.run
an executable file. Viruses also need a host file to attach to it for it to spread. By
replication,itmeansthattheviruscanmultiplyitself(producesseveralsimilarcopies
o fitself)whenitentersthecomputersystem.Exampleso fknownvirusesare:Virus
Melissa, Jerusalem, Cascade, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page120of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ntivirus programs
A
These areprogramsthatdetectcomputervirusesandreducetherisko fcomputers
being attacked by virusesforexampleNortonAntivirus,MacAfee,Avira,Avast,AVG,
etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page121of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
7. Memory Resident Virus
his broad virus definition applies to any virus that inserts itself into a system’s
T
memory. It then may take any number o f actions and runindependentlyo fthefile
that was originally infected.
DATA COMMUNICATION
his deals with the means o f sending and receiving data o nnetworkedcomputers.
T
Transmitted data can be in analogue or in digital form.
Digital Data: Data is in discrete value, that is,in ones and zeros.
AnalogueData:Dataisincontinuouslyvaryingform,inphysicalo ro riginalforme.g.
human voice.
ransmission Modes
T
Transmission modes include Simplex, Duplex (Full duplex) and Half Duplex
Simplex Transmission Mode Half Duplex Transmission Mode Duplex Transmission Mode
A B C
alfDuplex:Thisisatransmissionmodeinwhichdatatravelsinbothdirectionsbut
H
notsimultaneously.Itisbi-directionalbutnotsimultaneous.SeediagramBabove.The
receiver waits until the sender has finished sending data in order for him to respond.
ransmission impairments
T
This refers to change in signal form as it propagates through the transmission
channel. Transmission impairments include:
Attenuation: The loss of signal power as it movesthrough the transmission channel.
Noise: Occurs when an unwanted signal from o ther sources than the transmitter
enters the transmission channel.
Multiplexing
Compiled by: Kapondeni T. Cell:0772 245 866 Page122of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
hisisamethodo fallowingmultiplesignalstosharethesamechannel,reducingtoo
T
much cabling, as shown below:
A multiplexer is used in
multiplexing. A multiplexer
isadevicethatjoinstwoo r
more channels into o ne
channel while the
de-multiplexer is
responsible for splitting a
channel into a number o f
themforeasytransmission
to the intended destination.
Bandwidth
Referstothecaringcapacityo fatransmissionchannel(measuredinbitspersecond:
bps). It determines the amount o f data a channel can transmit atagivenperiodo f
time.
ransmission Media
T
Refers to forms o f media through which data is transferred from o ne point to
another. These include:
1.TwistedPair:Thesearecableswithtwocopperwireso fabout1millimetrethick.
Thewiresaretwistedtoavoidcrosstalk.Twistedpairisverycheaptobuyando ffer
good performance over short distances.
Disadvantages of twisted pair: Twisted pair is very cheap to buy. Has big
attenuation. Has low bandwidth
.Coaxialc able:Itisastiffcopperwiresurroundedbyaninsulatingmaterial.Ithas
2
less attenuation than twisted pair, has high bandwidth and has low error rates.
However, coaxial cable is expensive to buy and is stiff, making it difficult to handle.
. Fibre optics:Amediathatuseslighttotransmitdata.Ithaslessattenuation,has
3
very high bandwidth and cannot corrode (not affected by corrosion),itisthinand
therefore has less weight. However, fibre o ptics is very expensive to buy and is
uni-directional (travels in one direction only)
Compiled by: Kapondeni T. Cell:0772 245 866 Page123of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ata security refers to the means o f protectingdatafromunauthorisedaccessand
D
from deliberate o r accidental loss. It includes the safety o f data from any form o f
hazard like floods, theft of the computer, fire, etc. Data security can be achieved by:
B:aUPSisadeviceconnectedbetweenacomputerandapowersourcetoensure
N
thatelectricalflowisnotinterrupted.UPSdevicesusebatteriestokeepthecomputer
running for a period o f time after a power failure. UPS devices usually provide
protection against power surges and blackouts as well.
. Data integrity
2
This refers to the correctness and accurateness o f data held in the computer. The
issue o fdataintegrityandsecurityleadtotheintroductiono fsomedataprotection
laws which govern how organisations holding public data must operate.
Compiled by: Kapondeni T. Cell:0772 245 866 Page124of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
O
● rganisations using personal data must be registered.
● Data about individuals must be o btained fairly and lawfully for thepurpose
collected for.
● Datamustbeusedo nlyforthespecificpurposecollectedforandmayo nlybe
disclosed in accordance with such a purpose.
● Datacollectedmustnotbeexcessiveforthepurposecollectedforbutmustbe
adequate and relevant.
● Data collected must be accurate, up-to-date and kept no longer than
necessary.
● Data must be protected from unauthorised access or loss.
● Individuals with collected data havetherighttoviewitandmakealterations
where necessary.
Compiled by: Kapondeni T. Cell:0772 245 866 Page125of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● D o not connect the computers to a network. If connected to a network use
dedicated lines.
● Physical security- locks on computer room doors andemploy guards.
● Install Firewall.
● Use Proxy server security.
● Data can be encrypted.
● Use iris and palm recognition systems.
● Use of swipe cards, finger print recognition systems.
● Useofaudittrail:Theprocessthattrackstheactivitieso fusersbyrecording
selected types of events in the security log of a server or a workstation.
.Backboneproblems:sittingo nthecomputerforalongperiodcancausethis.This
3
can be solved by:
Usingachairthatisadjustabletofittheheightsuitableforeachemployee.Sittingup
while using the computer.
4. Increase in the amount of litter due to dumping of used and old computers
.Childrenarebeingexposedtopornography,hateliterature,racismanddangerous
5
experimentslikethoseformanufacturingbombso ntheinternet.Thisc anbesolved
by:
Installing software that prevents children from accessing restricted sites o n the
internet like Net-Nanny, Surfwatch, Cybersitter, etc. This software blocks
inappropriate sites and subject matter. Teachers and parents need to closely
supervise students during internet access. Firewalls can also be installed as a
security measure.
WHAT IS A COMPUTER?
Compiled by: Kapondeni T. Cell:0772 245 866 Page126of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
I t is an electronic device that works under the control o f stored programs to
automaticallyaccept,storeandprocessdataintoinformation.Therefore,acomputer
has the following characteristics:
● It is electronic:- can only work when there is electricity
● It is a device:a machine
● Is controlled by programs: Works according to instructions, written in
computer language, given by the user for it to perform a specific tasks.
● Is automatic in operation: Can work with minimum o r no human
intervention.
● Can accept data: data can be entered into the computer through various
means and the computer accepts it.
● Can store data and programs: Data and programs entered into the
computer can be stored for future use.
● Can process data into information
.Information:Itisdatathathasbeenconvertedintomeaningfulform.Ingeneralit
2
is processed data. Information can be understood and therefore can be used for
decision making purposes. Information is meaningful. To get relevant information,
dataenteredintothecomputermustberelevant,accurateandup-to-date.Ifdata
entered into the computer is wrong (Garbage In) the results will also be wrong
(GarbageOut),andisgenerallyreferredtoasGarbage-InGarbage-Out(GIGO).Itis
a rule stating that the quality o f theo utputisafunctiono fthequalityo ftheinput;
put garbage in and you get garbage o ut. Therefore the accuracy o f the results
producedbythecomputerdependso nhowaccuratetheuserentersdata,functions,
formulae and codes program procedures.
omputer Generations
C
Referstostagesthroughwhichcomputersdevelopedfromthe1940stodate.These
are as follows:
1. FirstGenerationComputers(1945-1955):Thesearetheearliestcomputers
that used valves in controlling machines, e.g. EDVAC, ACE and UNIVAC
machines. These were very large computers, fitting about the size o f an
average room. They were programmed inalanguageunderstandablebythe
machine.Suchcomputersusedaloto felectricityandwereveryexpensiveto
Compiled by: Kapondeni T. Cell:0772 245 866 Page127of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
purchase. Only very large o rganisation could afford these computers. Such
c omputers werehuge,slow,expensiveandoften undependable.
. Second Generation Computers (1955 -1965): These are computers that used
2
transistorsinsteado fvalves.Theywerefaster,hadreducedsize,weremorereliable
and less expensive.
Transistor
. Third GenerationComputers(1965–1980):Theseusedintegratedcircuitse.g.
3
the IBM (International Business Machines) computers. The integrated circuit, also
referredtoassemiconductorchip,packsahugenumbero ftransistorso ntoasingle
wafer o f silicon. These computers have increased the power, lowered cost, carryout
instructions in billionths of a second, andsmaller.
. Fourth GenerationComputers(1980-1990):TheFourthGenerationComputers
4
that used microprocessors and concentrated o n miniaturisation o f highprocessing
components.FourthGenerationComputersaregroupedintomainframe,mini,micro
and super computers, depending on their sizes, capabilities and memory size.
Microprocessor
. Fifth Generation Computers (1990 to date and beyond): These use natural
5
language and can flexibly interact with the human being. Such systems areusedin
medical diagnosis,mineralprospectingandingeologicalresearches.Suchcomputer
systems are capable of human intelligence and are commonly called expert systems.
ypes of Computers
T
The types o f computers are: Micro-computers, mainframe computer, super
computer & mini-computer.They can also bedigitalo ranaloguecomputers.
1. MicroComputers:Thesearecomputerswithamicroprocessorinsidethemand
o ccupy a small physical space. They are cheap, small, relatively slow and have
limited memory, often single user, easy to use and have low computing power.
Microcomputersinclude the following:
Compiled by: Kapondeni T. Cell:0772 245 866 Page128of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
a. D esktop Computers: These are computers with a separate CPU and monitor
andfito nadeskduringusage.Theyarerelativelycheap.Theyareeasytoadd
expansioncardso nthem.However,theytakeuplargedeskspace.Theyarenot
portable
b. PersonalComputers(PC):-Thesearemicrocomputersmadeforuseathome
for general purpose, and includes desktop computers. They are cheap, more
powerful and has good storage capacity disks.
Advantages of desktop/PCs
- Low cost
- Spare parts tend to be standardised
- Faster processors, 2.0 GHz
- Large casing allows good dissipation of any heat build-up
Disadvantages
- Not portable
- Take large desk space
- All devices need to be wired together which might be too complex
c. P
almtops: These are portable microcomputers that can fit in the palm and
pocket and are used as diaries and for other small business applications.
TheyareHandheldComputersthataresmallenough
to be carried in a pocket and include Personal
Digital Assistants (PDAs) and Cell phones. These
are mostly used as diaries, word processing, faxing,
internet browsing, calculator, contacts, etc.PDAsand
all palmtops are portable. However, they are
expensiveandhavelimitedexpansion.Theyareeven
slow to input data using them.
d. L
aptops (Notebook computers): - These are portablecomputersthatusean
internal battery for power and can be placed o n laps during usage. The
keyboard, pointingdevice,monitorandprocessorarealldesignedaso neunit.
TheyhaveLCD(LiquidCrystalDisplay)screenswhicharenotasbrightasmost
Monitors.
Laptopsaresmalllikeabriefcaseandare
portableandcanbeusedinareaswhere
there is no electricity. They have light
weight and are battery powered. They
consume less electricity. The processor
does produce too much heat. They also
donothavetrailingwiresaseverythingis
in o ne unit. They cantakefulladvantage
o f WIFI.
Laptop computer
Compiled by: Kapondeni T. Cell:0772 245 866 Page129of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
owever, laptops can easily get stolen,
H
they need recharging from time to time,
some find it difficult to use the laptop
keyboardandinbuiltmouse,andtheyare
evenexpensivetobuyandtorepair.They
also have limited expandability and
docking stations. Laptops are more
subject to wear and tear due to
portability. They can also be stolen easily.
e. NetbookComputer:Thesearesmallerversionso flaptops,theycanalmostfit
in a hand and do not have o ptical devices (CD/DVD drive) o n them. Their
benefits and problems are similar to those o f laptops. However, they are
cheaper and they have a weakness that they do not have optical devices.
f. T ablet Personal Computers: Type o f notebook that accepts input from an
electronic pen
For schools and school children, laptops have the following advantages:
- Users can save data in their own storage area wherever they are.
- Users can get any networked software wherever they are.
- School needs fewer printers.
- Users do not need to keep using the same machine.
- Users can access school intranet from anywhere.
- Users can access Internet from anywhere.
- Users do not need to carry CD ROMs.
- It is easier to communicate with.
- Can email work to teachers even from home.
- Staff can monitor students easily.
- Students and teachers can share files and notes easily.
Compiled by: Kapondeni T. Cell:0772 245 866 Page130of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
* NB:-Microprocessor:Asmallexecutionchipfoundo nmicrocomputersando ther
devices used to process data and to control o ther devices. It contains registers,
Control unit and the Arithmetic and Logic Unit.
-Microcomputersperformgeneralpurposeslikeword-processing,processingsmall
amounts o f data, playing music, etc. However, these days, microcomputerscanalso
be used in large organisations because of improved efficiency in their usage.
.MainframeComputers:thesearelargeandpowerfulcomputersystems.Theyare
3
mostly used in large o rganisations like banks and where bulk data processing is
needed such as census, industry/consumer statistics, and financial transaction
processing. They have the following features:
- they can have several CPUs,
- have very fast processor speed
- can support multiple operating systems
- have huge storage capacity
- have huge internal memory
- can operate using time sharing or batch processing
- Allows several users and can accommodate multiple processors.
- They are very large and expensive.
owever, because o f
H
their size, they are not
Mainframe computers portable and are
permanently housed in
a large room. They are
also expensive to
maintain and to operate.
. Super Computers:Theseareverypowerfulcomputersthatareusedtoperform
4
detailed calculations and for design purposes, for example, modelling o f aircraft
wings, testing bombs, etc. They are the fastest and most expensive computers
Compiled by: Kapondeni T. Cell:0772 245 866 Page131of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
S upercomputer
*NB:- The classification o f computers as micro, mini, mainframes and super
computers have become blared due to recent technological advancements since a
microcomputer can now perform all functions that were believed to be for
mainframes.
( b)To Customers
- Robust and therefore fewer repair bills
- Low power consumption
- Cheap to buy
- Faster processing
- More versatile
Compiled by: Kapondeni T. Cell:0772 245 866 Page132of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Efficient since they can be dedicated to a specific task
Compiled by: Kapondeni T. Cell:0772 245 866 Page133of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- Applicationintendedfor:whatthecomputerwillbeusedfor,generalpurposeo r
specialised purpose.
-Method of operating the computer: single user, multi-access,etc.
- Number of Input and output devices it can handle.
LEMENTS/COMPONENTS OF A COMPUTER
E
The main/major elements (components) o f a computer are illustrated o n the
diagram below; namely Input Devices, Storage Devices, Processing Device and
Output Devices.
B:InternalComponentsofacomputer:referstothecomponentso faprocessor,
N
which are Control Unit, Arithmetic and Logic Unit, Registers and Clock
Internal components can also include componets enclosed inside the CPU casing
such as; buses, fans, memory (RAM and ROM), etc
ardware: These are parts o f a computer that exits in physical form, for example
H
mouse, keyboard. Hardware refers to tangible devices o f a computer. Hardware is
groupedinto:InputHardware,ProcessingHardware,OutputHardware,Storage
devices and communication hardware.
I nput Hardware
Thesearedevicesusedtoenter/feeddataintothecomputer,forexamplemouseand
keyboard. Below are some of the input hardware and their uses:
(i)Keyboard:Itisadeviceusedtoenterdataandinstructionsintothecomputerby
typing.Itisamanualinputdevice.Itissimilartothetraditionaltypewriter.Itisused
to enter alphabetic letters (A-Z-both lower case and upper case), numbers (0-9,
positive and negative) and o ther special characters like the %, $, coma, ?, and the
space. Keyboard entry o f data is manual and its excessive use without breaks will
causeRepetitive Strain Injury (RSI).
*NB: - A c haracter is any symbol, digit o r letter that can be entered into the
computer,eg.$,%,5,h,etc. Thesecharacterscanbenumeric(numbers0-9,positive
andnegative),alphabetic(lettersA-Z,bothloweranduppercase),alphanumericdata
(a combination o f both numeric and alphabetic characters) and special characters
(space, $, >, etc.).
Compiled by: Kapondeni T. Cell:0772 245 866 Page134of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
* NB: - Control Character: - Refers to
non-printable character code o r
numberinthecharactersetthatdonot
represent a written symbol, e.g.
carriage return, tab key, etc.Theseare
mostly used in peripheral devices
control and for communication
purposes,forexample,carriagereturn,
tab o r backspace; ando therstypedby
depressingakeyandthecontrolkeyat
the same time.
*NB:-Extended
Standard keyboard Binary-Coded-Decimal Interchange
Code (EBCDIC) an 8-bit character set
and encoding representing 256
alphanumeric and special characters
- ASCII - American Standard Code for Information Interchange: - a code for
information exchange between computers madebydifferentcompanies;inwhicha
string o f 7 binary digits represents each character; used in most microcomputers.
Each character has its ASCII binary code that can be understood by the computer.
(d)Numeric keypads: mostly used to enter numbers o nly. Used o n ATMs, to
enter PIN and amount to be withdrawn. Also found o n cell and telephones,
Chip and pin devices, and o n ElectronicPointo fSaleterminals(EPOS).They
arefasterinenteringnumericdataascomparedtostandardkeyboards,very
easy to carry around if foundo ncellphones.However,theyhaveverysmall
keys which can be difficult to use. It is difficulttousethemforenteringtext
data.
( ii) Mouse: It is a pointing device used to enter data and instructions into the
computerbyclicking.Amousehaseithero ne,twoo rthreebuttons.Amousecanbe
cable or wireless. The mouse is also used to:
Compiled by: Kapondeni T. Cell:0772 245 866 Page135of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- S elect options from a menu
- Position the cursor when editing text/typing
- Select an object for drawing and for editing diagrams
- Select icons/text to be formatted, deleted or edited.
- Control movement of pointer on the screen.
Advantages of mouse
- Itisafastmethodo fenteringdataandforselectingitemsascomparedtothe
keyboard.
- It is faster to move cursor around the screen using a mouse than a keyboard.
- Usually supplied with the computer and so there are no additional costs.
- Very easy to use for most users.
- Take up very small area of the desk
- Very fast to switch between programs
Disadvantages of mouse
- Needs a flat surface on which to operate
- Can be easily stolen or vandalised
- Some people find it very difficult to use
-
(iii) Touchpad
Thesearepointingdevicesusedo nlaptops,whereo nemovesafiguretocontrolthe
pointero nthescreen.Theirusesaresimilartothoseo fmouse.Theyaidportability
sincetheyareattachedtothewholecomputersystem.Canalsobeusedwherethere
arenoflatsurfacesavailable.However,theyaredifficulttouse,e.g.whendoingdrag
and drop.
(iv) Scanner: an input device used to convert images frompaper(hardcopy)into
electrical signals for input into the computer.
The images can then be edited,
printed o r saved. Mostly used to
scanpictures,photographs,etc.they
can use OCR, convert to Word o r
pdf format directly.
Compiled by: Kapondeni T. Cell:0772 245 866 Page136of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
( v) Digital Camera: A device use to capture photographs, films, videos o r a
combination of both for entry into the computer where they can be edited.
- no film is needed (saves costs for purchasing films and developing the film)
- Unwanted images can be deleted straight away
- Imagesarealreadydigitalandthereforecanbetransferredtoacomputerfor
editing immediately,
- Easier and faster to upload photos to the computer
- Produce better quality images than the traditional camera
However:
- Images need to be compressed
- Needs those who are computer literate to use it efficiently
(vi) Touch Screen: A screen display o n which you could enter data by
pointing/tapping with a finger o n intended o ption. Used o n (ATMs)-Automated
Teller Machines, cell phones, computers, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page137of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
( viii) Joystick: A device specifically used for playinggames.Canbeusedtocontrol
pointer o n screen by gripping the stickwhenmakingselections. Usedalsoinflight
simulators.
I tcanbeanalternativetoamouse.It
consists o f a base and a stick
perpendicular to the base. The stick
can be moved in any direction,
enabling the user to move an o bject
around the computer screen. A
joystick can perform a similar
function to a mouse o rtrackball,but
is o nly commonly used for playing
games, controlling aircraft,
Two types of joystick controlling motorised wheelchair.
In construction, joysticks areusedto
control machinery such as cranes.
dvantage: Easier tonavigateround
A
screen, control is in 3-dimension.
( ix)Trackerball:Itisaninputdevicewithasmallballthatcanbemovedbypassing
thepalmo fyourhandoverit.Thiswillmoveanarrowo nthescreenandtherefore
can replace a mouse.
It is used todrawdesignsandto
select o ptions from menu. Used
as an alternative to a mouse. To
o perate it the user rotates the
ball which moves the pointer o n
screen.Theyareparticularlyeasy
to use for those with limited
Tracer ball
movementintheirhandsandare
o ften used in Computer Aided
Design (CAD) for their increased
precision over a mouse.
Advantages of trackball
- It is stationery and therefore do not need a flat surface to move on
- Less likely to get damaged than mouse
- Less tiring as less movement is needed
- Can be useful in laptops
Disadvantages
- Rolling the ball is less effective than using mouse
- Can be difficult to control
- Not supplied as standard device, so extra cost is incurred
- Muscles can be strained due to repeated movement
( x) Remote Control
Device used to control the o peration o f o ther devices remotely by using infra-red
signals. Has button to select options, e.g. TV stations, volume, etc.
Compiled by: Kapondeni T. Cell:0772 245 866 Page138of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Uses
- Used in home entertainment devices like TVs, DVD players, HIFIs, etc
- Remote controls for multimedia systems
- Stop/ start machinery in industrial applications
Advantages:Allowsdevicestobecontrolledfromadistance,Flexibletothedisabled,
safer to use in chemical processes.
Disadvantages: People arm problems/disabilities cannot use them, signals can be
blocked (need a line of sight)
( xi) Microphone: It is an analogue input device that recognises human voice for
data entry into the computer.
Microphones are used to input sound.
In computing, they can be used with
voice recognition software andaword
processing application to enter text.
Webcamscommonlyhavemicrophones
built-in too.
* NB:-An analogue device is a device that recognises data in continuously varying
form,e.g.microphone,wallwatches(withminute,hourandsecondhand),fuelpetrol
gauge, speedometer, etc.
A microphone is used in voice recognition systems (voice synthesis). These are
computerisedsystemsthatallowuserstocommunicatewiththecomputerbytalking
(voice input).Such systems have the following advantages:
- The systems are over 90% accurate.
- They are appropriate for the handicapped, especially those without hands.
- They are very fast in entering data and in giving instructions to the computer.
- They are speaker independent.
- They can recognise natural language.
Disadvantages:
- Older systems are speaker dependent.
- They allow the user to speak slowly, using specific words that were
programmed for it to understand.
NB:Multimediaspeakers,soundcards,amicrophoneandvoicerecognitionsoftware
are needed in voice recognition systems.
Light pen
Compiled by: Kapondeni T. Cell:0772 245 866 Page139of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
( xiii) Kimball Tags: Thesearepunchedcardswithamagneticstripwhichcontains
details of a product, mostly clothes in a shop.
( xv) Webcam: A digital video camera designed to take digital photographs and
transmitthemovertheinterneto rtothecomputer.Theydonothaveownmemory.
Laptops have their own web cam.
Uses: viewing each o ther when chatting o n internet. For video conferencing. For
taking personal images.
Advantages: can be left o n and o nly activated when required.Peoplecanseeeach
o ther when chatting.
( xvi)Sensor:aninputdevicethatautomaticallyrecordsphysicaldatabysensingthe
environment it is supposed to record, e.g. humidity sensor.
( xvii) Magnetic Stripes: Magnetic stripes can be seen o n train tickets o r bank o r
credit cards.
Smart cards
- Smart cards are simple to produce
- Not easily damaged
- Store a fairly large amount of information
- Automatic input devices, reduce paperwork
However:
- Data can be changed by magnetic fields
Compiled by: Kapondeni T. Cell:0772 245 866 Page140of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
- T he strip can be damaged by scratching
- Limited storage capacity
- Not very secure as thieves can alter the data.
(xix) Barcode Reader: These are devices at Electronic Point of Sale terminals
( EPOS)thatreadbarcodeso nproductsforautomaticdataentryintothecomputer.
Mostly used in library systems, luggage handling systems at airports, warehouse
stock control, etc.
Barcodes are numbered vertical lines
and spaceso fvaryingsizeo nproducts
thatprovidedataforsuchaproductto
the computer when read by barcode
readers.
If the barcode reader fails to read the
barcodes, data is entered manually
Barcodes
through the keyboard by entering the
numbers below the barcodes.
ow does the computer system c hecks that the barcode has been read
H
correctly?
Either the computer performs the following:
Calculatesthecheckdigit;remainder=0ifbarcodehasbeenreadcorrectlyORuses
the weights and modulus 11 and use remainder
Areas where barcodes are used:
- Library book systems
- Passport and ID card systems
- Equipment checking systems
- Automatic stock taking in supermarkets
(xx)Video digitiser
Compiled by: Kapondeni T. Cell:0772 245 866 Page141of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
videodigitisertakesanimagefromavideocamerao rtelevisionanddigitisesitso
A
it canbereadby,andstoredo n,acomputer.Videosequencescapturedusingvideo
digitisers are often used in multimedia presentations.
( xxi) Stylus:device used to write on sensitive padso r screen for data entry into the
computer. Often purchased with touch screens
OCUMENT READERS
D
Thesearedevicesusedforenteringdataautomaticallyintothecomputerbyreading
through documents. These include:
(i)OpticalMarkRecognition(OMR):TheOpticalMarkReadersuselightsensitive
devices to sense pencilmarkso napieceo fpaperforautomaticdataentryintothe
computer. Lightisreflectedfromthedocumento ntotheOpticalMarkReaderwhich
records the o utput. It then records low intensity/zero intensity at certain points.
OMRismostlyusedinmarkingmultiplec hoiceexamsatZJCand‘O’Level,reading
pupils’ registers,playinglotto,etc.AnOpticalMarkReaderisthedevicethatisused
for automatic data entry in OMR systems.
- OMR is fast in entering data
- It is also accurate and reliable in entering data.
- Has better recognition than OCR
- Can be prepared where data originates, without machines
- Errors can be corrected easily
However:
- Mark readers are relatively slow
- Verification of data is difficult
- Document may be difficult to design
- Forms must be completed clearly for data to be recorded accurately
- Papers need to be clean
Compiled by: Kapondeni T. Cell:0772 245 866 Page142of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
dvantages
A o f using
magnetic ink o n cheques
include:
- Bundles o f cheques
can be processed
very quickly.
- It is verydifficultto
forge a cheque.
- Theinkcanberead
by the reader even
if the cheque gets
marked or dirty.
A Magnetic Ink
CharacterReaderisthe
device that is used for
automatic dataentryin
MICR systems
UTPUT DEVICES
O
Thesearedevicesusedtodisplayandproducedataandinformationheldinsidethe
computer, for example: screen, printer and graph plotters. These are described
below:
( i)Printers:Aprinterisadevicethatisusedtoproducehardcopieso fdataheldin
the computer. Hardcopy is a document printed o n paper. Output from the printer
appears as displayed o n the computer screen, thus What You See IsWhatYouGet
(WYSIWYG).
Types of Printers
Compiled by: Kapondeni T. Cell:0772 245 866 Page143of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
rinters can be classified intoimpact and non-impact printers.
P
(a) Impact Printers: these are printers whose write heads hit ink ribbon against
paper during printing, e.g. dot matrix printer, chain printer, daisy wheel, printer, drum
printer, etc. Thus, thereiscontactbetweenthepaperandthewriteheadsduringthe
printing stage. Examples include drum printers, dot matrix printers, daisy wheel
printers and chain printers. Impact printers have the following advantages:
● they arevery cheap to buy.
● They are cheap to repair and to maintain.
● They can use continuous paper.
● They are economic in terms of ink usage.
Weaknesses
- Low resolution
- Noisy
- Slow printing speed: this is because they can be character based or line based
printers.
Compiled by: Kapondeni T. Cell:0772 245 866 Page144of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● The toner is not water-soluble
The disadvantages of laser printers are as follows:
● they are very expensive to buy,
● they are large and therefore take up a lot of desk space,
● they are quite complex and therefore repair bills can be very high,
● Multipart stationery cannot be used,
● Cannot be used with continuous stationery since they are page printers.
● Toner is toxic and therefore should be disposed of carefully after use.
I nkjet printers
uses print head to propel droplets of ink on a sheet of paper.
Advantages:
● relatively high resolution
● Good colour production
● Low cost/heap to buy
● Usually small size
Disadvantages
● Slow printing speed
● Ink is expensive
● Has a water soluble ink which may be spilt
● Running costs are expensive
* NB: - Printers can also be classified as page printers (these print o ne page at a
given time and are therefore faster), line printers (print o ne line at a time, very
slow) and character printers (print one character at a time).
( ii)Screen/Monitor:itisatelevisionshapeddeviceusedtodisplaycontentso nthe
computerassoftcopy.Softcopyreferstodataviewedo nthescreen.Thescreencan
also be called the Visual Display Unit (VDU). The screen can differ in terms o f
resolution,thatislowresolutionscreensdisplaylessnumbero fdotsperincho nthe
computerandthereforethedisplaywillbeo fpoorquality.Highresolutionmonitors
are needed mostly in graphics packages where colour and many dotsperinchare
needed.
Monitors are of two main types:
- LCD (Liquid Crystal Display)
Relativelythinanddonotuseabeamo felectrons.Theyeasilyfito nwallsand
desks, light weight, compact and can fit o n laptops, little light is reflected,
absence o f flicker o nthescreen.However,imagescanbeviewedfromfewer
angles, can display limited range of colours.
- CRT (Cathode Ray Tube)
Compiled by: Kapondeni T. Cell:0772 245 866 Page145of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
hese are the o lder and bulker versions. To display content, an electricgun
T
firesabeamo felectronsfromtherearo ftheCRT.Theyarecheap,imagescan
be viewed from a wider angles, and has a wider range o f colour and
brightness. However, they are bulky and difficult to fit o n a desk, they are
heavy and difficult to mount on walls, and too much reflection can affect eyes.
- Plasma Display Panels:
Flat panel display used for television displays
Advantage of Monitors
- Its output is immediate and visual
- High speed of display
- No noise
- No wastage of paper
- Can display text, graphics, etc
-
Disadvantages
- When the display changes, the previous output is lost.
- Needs a separate device to produce hardcoy
( iii)GraphPlotter:Thisisadeviceusedtoproducehighqualitydrawingsinvarious
papersizesandisusedinComputerAidedDesign(CAD).Aplottercanbeusedto
producehighquality,accurate,A3sizeo rbiggerdrawings.Theyareusuallyusedfor
ComputerAidedDesign(CAD)andComputerAidedManufacture(CAM)applications,
such as printing o ut plans for houses o r car parts. They print sharper and more
precise drawings.
Graph plotter
( v) Speakers: produce sound from music files o n the computer. They are used in
conjunction with multimedia files.
( vii) Actuators: these are o utput/control devices which turns o n o r o ff some
devices in control systems. Some o f the control devices include electric heater
(supplier heat), electric motor (provide movement/rotation), motorised pump,
buzzers, lights, heaters, actuators, etc
Compiled by: Kapondeni T. Cell:0772 245 866 Page146of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ROCESSING DEVICE
P
A device used to convertandtomanipulatedataasperuserrequirement.Thesole
processing device o f a computer is the processor, which is inside the Central
Processing Unit (CPU) casing. Processing involvessortingo fdata,updatingrecords,
searching certain records, adding a sequence of numbers, and others.
The processor has the following functions:
- It controls the transmission of data from input device to memory
- It processes the data and instructions held in main memory
- It controls the transmission of information from main memory to output device.
- Controls the sequence of instructions,
- Give commands to all parts of the computer,
- Fetches the next instruction to be executed
- Decodes instructions
- Executes decoded instructions
Compiled by: Kapondeni T. Cell:0772 245 866 Page147of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
he processor comprises o f:
T
Arithmetic and Logic Unit (ALU) and
the Control Unit (CU) and Registers
(a) Arithmetic and Logic Unit (ALU)
- Carries o ut arithmetic o perations
like add, subtract, divide, etc.
-Performs logic o perations, like AND,
OR,..etc
(b) Control Unit (CU)
- It coordinates and controls all
hardware operations,
- It carries o ut the Fetch-Execute
Cycle.
(c) Registers: High-speed storage
area in the CPU used to temporarily
hold small units o f program
instructions and data immediately
before, during and after executionby
the CPU.
B: Memory (Main memory): Stores programs and data for programs currently
N
runningo nthecomputer.MainMemoryisveryclosetotheprocessorsandtherefore
the two can coordinate their activities very fast.
-ALUo perationso ndataarefirstloadedintotheaccumulatorregister,amemory
which stores instructions, data being processed and results of an operation.
Thefunctiono fthemicroprocessoristofetch,decodeandexecuteinstructions.This
is also called the Fetch-Execute cycle.
The Fetch-Execute Cycle
Step 1. Fetch instruction: In the instruction
phase, the computer’s control unit fetches the
instruction to be executed from memory.
Microprocessor gets softwareinstructiontellingit
what to do with data.
Step 2. Decode instruction:Thentheinstruction
is decoded so the central processor can
understand what is to be done. Microprocessor
determines what the instructions mean.
Step 3.Executetheinstruction:Intheexecution
phase, the ALU does what it is instructed to do,
making either an arithmetic computation o r a
The Fetch-Execute Cycle logical comparison. Microprocessor performs the
instruction.
Step 4. Store results:Thentheresultsarestored
in the registers or in memory.
Step 3 & 4 are c alled the executionphase.The
time it takes to complete the execution phase is
called the EXECUTION TIME (E-time).
After both phases have been completed for o ne
instruction, they are again performed for the
second instruction, and so on.
Buses
Compiled by: Kapondeni T. Cell:0772 245 866 Page148of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● A bus is a pathway through which dataandsignalsaretransferredfromo ne
device to another in the computer system.
● They are a set o f parallel wires connecting two o r more components o f the
computer.
● Buses can be internal or external.
● Buses can be generally referred to as system bus and this connect the CPU,
memory and I/O devices.
● Each bus is a shared transmission medium, so that o nly o ne device can
transmit along a bus at any one time.
● Multiple devices can be connected to the same bus
● The main types of buses are:
-Data bus:
● Used for carrying data from memory to the processor and between I/O ports.
● Comprises of either 8, 16, 32 or 64 separate parallel lines
● Provide a bi-directional path for data and instruction’s between computer
components. This means that the CPU can read data from memory and input
ports and also send data to memory and output ports.
● The width of the bus determines the overall system performance. For
example, if the data bus is 8 bits wide, and each instruction is 16 bits long,
then the processor must access the main memory twice during each
instruction cycle
-Address bus:
● Used for transferring memory addresses from the processor when it is
accessing main memory
● They are used to access memory during the read or write process
● The width o f the address bus determines the maximum possible memory
capacity of the computer.
● Thisauni-directionalbus(oneway).TheaddressissendfromCPUtomemory
and I/O ports only.
- Control bus:
● The purpose o f the control bus is to transmit command, timing and specific
status information between system components. Timing signals indicate the
validityo fdataandaddressinformation.Commandsignalsspecifyo perationsto
beperformed.Specificstatussignalsindicatethestateo fadatatransferrequest,
o r the status of request by a components to gain control of the system bus
● This is a bi-directional bus used for carrying control signals (Signals can be
transferred in both directions).
● They carry signals to enable outputs of addressed port and memory devices
● Control signals regulate activities on the bus.
● Control buses transmit command, timing and status information between
computer components.
an
F
A fan is used to cool the processor. It blows away hot air to that the processor
remains cool.
TORAGE MEDIA
S
These are devices used to store data and programs for future use.
Compiled by: Kapondeni T. Cell:0772 245 866 Page149of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
torage Capacity
S
Refers to the amount (volume) o f data a device can store. The following storage
measurements can be used:
Bit: The smallest unit of data a computer can store,either a 1 or a 0.
Nibble: refers to half a byte, that is, a group of4 bits.
Byte: a group o f 8 bits representing a character. For example, the letter C is
represented by the byte 01000011.
8 bits 1 byte
Compiled by: Kapondeni T. Cell:0772 245 866 Page150of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
* NB:-Formatting(initialising)adisk:thisistheprocesso fcreatingnewtracksand
sectors o n the disk that will be used in storing data. When a disk is formatted,
existingtracksandsectorsaredestroyed,includingthedatastoredo nthem,andnew
o nes are created. After formatting, the disk will be blank. Formattingisdoneusing
theFATo rtheNTFSfilesystem.FAT(orFAT16)standsforFileAllocationTable:-It
is a file system used by MS-DOS and Windows o perating systems to o rganise and
managefiles.ItisadatastructurethatWindowscreateswhenyouformatavolume
byusingFATo rFAT32filesystem.Windowswillstoreinformationabouteachfilein
aFATsothatitcanretrievethefilelater.FATuses16bitfilingsystem.FAT32uses32
bit values and uses drive space more efficiently and supportsdriveso fupto2TB.
Storage media is grouped inprimary storageandsecondarystorage:
RAM Chips
Compiled by: Kapondeni T. Cell:0772 245 866 Page151of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
AM is volatile, which means that it loses itscontentswhenpowerisswitchedo ff.
R
RAM is in two forms; that is, dynamic and static RAM. Static RAM is a Random
Access Memory chip whose contents do not change as long as thereiscontinuous
powersupply.DynamicRAMisRandomAccessMemorychipwhosecontentscanbe
lostevenifthereiscontinuouspowersupply.DynamicRAMneedstoberefreshedto
prevent loss of data.
Thesizeo fRAMalsoaffectsthespeedo fo perationo facomputerandthenumbero f
programsthatcanberuno nit.RAMsizecanbe16MB,32MB,64MB,126MB,256
MB, 448 MB, 1 GB, etc. The bigger the RAM size, the better the efficiency o f the
computer and the bigger the number of programs it can run at a given time.
( b) ROM (Read Only Memory): ROM is a semi-conductor circuit (chip) whose
contentscano nlybereadfromandcannotbeerasedo rmodified.ROMcontentsare
fixedduringmanufacturing,thatis,theyarehard–wired.Thesecontentscano nlybe
read from and cannot be modified.
The uses of ROM are:
- Stores the Basic Input-Output System (BIOS-refers to software that test
hardware at start-up, starts the o perating system and support data transfer
between devices.) of the computer.
- Stores control programs for the o peration o f the computer and its
peripherals.
- Stores translator programs.
ROM is grouped into:
Programmable Read Only Memory (PROM): This is a ROM chip whose contents
can be changed but only once. It is re-programmable only once.
Erasable Programmable Read Only Memory (EPROM): This is a Read Only
Memory chip whose contents can be erased and modified several times.
Electrically Erasable Read OnlyMemory(EEPROM):ThisisaReadOnlyMemory
chip whose contents can be erased and modified several times using electricity.
*NB:- Firmware (microcode):-refers to coded instructions that are stored
permanently in read-only memory, for example BIOS.
agnetic Storage
M
These store data o n magnetised field o f iron oxide and includemagnetictapes,zip
drives, diskettes, hard drives and flash drives.
( a)MagneticTapes:Theyaresimilartoanormalcassettetapeinshape.Theystore
data in serial and sequential o rder. They are mostly used to backup data. Their
storage capacity can be up to 20 GB. Data is also accessed in serial o r sequential
o rder. They can be used as off-line storage media.
Compiled by: Kapondeni T. Cell:0772 245 866 Page152of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
( b) Hard Disk (Hard Drive): These are disks used to store large volumes o fdata
andprograms,includingo peratingsystemsandareresidentintheCPUcasing.Data
isstoredo ntracksinarandomwayanddataretrievalisinarandomway.Harddisks
canstoredatao fupto300GB,butrangesfrom2GB,8GB,20GB,40GB,80GB,120
GB, etc. a hard disk can be internal o r external. External hard disks have a larger
storge capacity and can be used to back-up the system
Compiled by: Kapondeni T. Cell:0772 245 866 Page153of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
ses of Hard Disk:
U
● Creating backups for data.
● Storing communication and applications
software.
● Storing o f the o perating system from
which the computer will boot.
● Transferring large volumeso fdatafrom
o ne computer to another.
Hard disks have the following advantages:
● Itiseasiertoaccessdatastoredo nhard
disks.
● They have a long life span, o f about 5
years or more.
● Provides direct access to data.
● It is easier and faster to updatedatao n
ard disc: Internal Structure(Above) &
H
hard disks.
External Appearance (Below) ● They are more robust.
● Have large storage capacity, about 300
GB or more.
● Very reliable to use
Compiled by: Kapondeni T. Cell:0772 245 866 Page154of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Transferring small amounts of data from one computer to another.
●
● Booting up the computer in case of system failure, for system recovery.
● Storage of small programs and data.
Advantages of Diskettes:
● They are portable (easy to carry around as they can fit in a shirt pocket.).
● Conceals less electricity.
● Most are high Double Density Diskettes.
Disadvantages of Diskettes:
● have very short life span (not durable).
● Can be affected by humid conditions.
● Can easily be affected by dusty conditions.
● Can easily be damaged if placed close to the screen for a long time.
● Takes long to read data into memory than from a hard disk.
● Hold very small amount of data, 1.44 MB.
( d) Zip Drives: Similar to diskettes in shape but does not flop. Data is stored in a
random way. Data is accessed in a random way. Storage capacity is 100 MB.
Advantages of Zip Drives:
● They are portable (easy to carry
around as they can fit in a shirt
pocket.).
● Conceals less electricity.
● Relatively cheap
● Most are high Double Density
drives.
● More durable than diskettes
● Good for archiving data
Disadvantages of Zip Drives:
● Hold small amount o f data o f
about 100 MB.
● Not as compact as USB flash drive
● Slow data transfer rates
Zip drive
Compiled by: Kapondeni T. Cell:0772 245 866 Page155of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
(a) Flash Memory
lash memory is a type ofEEPROM. Flash memory isnon-volatile(like ROM) but
F
the data stored in it can also beerasedo rc hanged(like RAM). Flash memory can be
found in many data storage devices. You might wonder why, since flash memory is
non-volatile, normal computers don’t use it instead of RAM. If they did we would
have computers that you could turn off, turn back on again and no data would be
lost – it would be great
The reason is speed – saving data to flash memory is very slow compared to saving it
to RAM. If a computer were to use flash memory as a replacement for RAM it would
run very slowly.
However some portable computers are starting to use flash memory (in the form of
solid-state ‘discs’ as a replacement for hard-drives. No moving parts mean less to go
wrong and longer battery life.
emory Cards: memory card is like a portable harddisk that fits into personal
M
computer card slot.
Compiled by: Kapondeni T. Cell:0772 245 866 Page156of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
S toragecapacityrangesfrom1GB,2GB,4GB,
8 GB and 32 GB.
Advantages of Memory Sticks:
● have a long life span about 3 yrs.
● Have large storage capacity about 32
GB or more.
● Provide direct access to data.
● Very cheap to buy.
● Portable since they can fit in a pocket.
Disadvantages of Flash Drives:
Memory stick ● Oldermachineshavenosocketstoplug
in memory sticks.
● They need software/drivers installed
for them to work.
● They can get lost easily. Virus spread
quickly through them.
. Bus: A communication line used for data transfer among the components o f a
1
computer system
2. USB: - An external bus that supports Plug and Playinstallationo fdevices.Using
USB, you can connect and disconnect devices without shutting down o r restarting
your computer. You can use a single USB port to connect up to 127 peripheral
devices, including speakers, telephones, CD-ROM drives, joysticks, tape drives,
keyboards,scanners,andcameras.AUSBportisusuallylocatedo nthebacko fyour
computer near the serial port or parallel port.
3. USB port: An interface o n the computerthatenablesyoutoconnectaUniversal
Serial Bus (USB) device. USB is anexternalbusstandardthatenablesdatatransfer
rates of 12 Mbps (12 million bits per second).
Compiled by: Kapondeni T. Cell:0772 245 866 Page157of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Uses of compact disks:
● Transferring data from one computer to another.
● Creating backup storage for programs and data.
● Booting the computer when loading the
o perating system o r restoring damaged system
files (system repair).
Advantages of CDs:
● Provide fast and direct access to data.
● Has large storage capacity of about 750 MB.
Compact disc ● Produces high quality sound and pictures.
● It is a multi-media device.
Disadvantages of CDs: Can be affected by direct
sunlight.Lessdurable.Theycaneasilygetscratched.Not
so easy nor fast to save data on them
Types of CDs
1. CD-ROM (Compact Disk Read Only Memory) a common form o f o ptical
Disks on which data, once it has been recorded, cannot be modified.
2. CD-W(CD-Writeable)ano pticaldiskthatcanbewrittenupon,buto nlyo nce.
Often called WORM (Write Once Read Many) disks.
3. CD-RW (CD-Rewriteable) o n o ptical disk that allows personal computer
users to replace their diskettes with high-capacity CDs that can be written
upon and edited over.
dvantages to schools of storing learning materials on a CD-ROM other than
A
using the Internet
● No danger of accessing doubtful websites.
● Does not take as long to find required information.
● Do not have to have a modem.
● Do not need for a telephone line.
● Once CD ROM is bought there is no additional expenditure.
● Do not have to remember user id/password.
● Usually quicker to load material.
● Information on CD is more reliable
DisadvantagestoschoolsofstoringlearningmaterialsonaCD-ROMotherthan
using the Internet
● CD ROM can be lost easily.
● CD ROM can be damagedeasily.InternetisuptodatewhileCDROMissoon
o ut of date.
● CD ROMs are expensive to replace and to update.
● Less information can be stored on the CD-ROM as compared to the internet.
. DVD (Digital Versatile Disc): Are spherical in shape that can store data o n 2
2
sides. Stores data o n tracks in a random way. Data retrieval is in random o rder.
Storage capacity is about 4 GB. Writing o f data o n DVD is done by a device called
DVD writer/burner. There are several formats on the market, such as:
DVD-ROMs - read only, the data is written to thembefore they are sold.
DVD-R -meaningDVD-Recordable,theusercanwritedatatotheDVDo nceo r
fill it over time using multi-session.
DVD-RW - meaning DVD-ReWritable, theDVDcanbewrittenandre-writtento.
Unlike multi-session discs, existing data can be overwritten.
Compiled by: Kapondeni T. Cell:0772 245 866 Page158of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
Uses of DVDs:
● Transferring larges volumes of data from one computer to another.
● Creating backup storage for programs and data.
● Booting the computer when loading the o perating system o r restoring
damaged system files (system repair)
Advantages of DVDs:
● Provide fast and direct access to data.
● Has large storage capacity of about 4 GB.
● Produces high quality sound and pictures.
● It is a multi-media device.
Disadvantages of DVDs:
● Can be affected by direct sunlight.
● Less durable.
● They can easily get scratched.
Caring for DVDs, VCDs and CDs:
● Do not expose them to direct sunlight.
● Do not touch the recording surface.
● Use soft marker for labelling and not ball point.
● Keep the free form dust conditions.
* NB: - Virtual Memory – Refers to temporary storage (on hard disk) used by the
computer to run programs that need more memory(RAM)thanthecomputerhas.
For example, programs could have access to 4 gigabytes o f virtual memory o n a
computer's hard drive, even if the computer has only 32 megabytes of RAM.
ii. Distance learning made easier through chartrooms, digital interactive television,
CD-ROM(storageo fencyclopaedia,learningmaterials(content)).Learningmaterials
like the encyclopaedia can be stored o n the CD ROM as it will have the following
advantagesas compared to a printed (manual) encyclopaedia:
● Cannot write to it so cannot be changed.
● Can use sound, text as well as video for students to understand better.
● Search of data is quicker.
● Can printout data conveniently.
● It takes up less space.
● Is more portable.
owever,theelectronicencyclopaediahasthefollowingdisadvantagesascompared
H
to a manual one:
● Users need a suitable multimedia computer for them to use it.
● The computer could crash and access to data will not be possible.
● Can lead to electricity expenses.
● Cannot be read in awkward locations.
● Takes time to start up the computer.
● The disk can be stolen easily.
● You can’t add notes to a Recordable Compact Disk
iii. Peoplewithcommunicationdifficultiesliketheblindanddeafareassisted,e.g.in
voice recognition systems.
Compiled by: Kapondeni T. Cell:0772 245 866 Page159of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
iv.Computerscanbeusedtoorganiseeventsinschools,forexample,parents’visits,
timetable, etc.
v. Used to store students data, exams, teachers records, etc.
vi. Used as teaching aids in all subjects. Enables interactive teaching
vii. For marking multiple choice examinations on scanner sheets
viii. For storage of student data pertaining to subjects, teachers and subjects taken.
ix. Used as a subject for student to learn, e.g. Computer Science, Information
Technology, etc.
x. Used for carrying o ut researches and experiments which may be dangerous for
human beings to do.
xi. Computers can also be used in Computer Aided Learning (CAL) and Computer
Aided Instruction (CAI).
CAI: a teaching system that o perates o n drill andpracticeprinciple,forinstance,in
teachingcomputers,astudentispresentedwithawordanditsmeaning.Thestudent
studies it and will be asked its meaning at a later stage.
CAL:Thiswherebyalessonisrehearsedbeforethecomputerandthenplayedback
totheclasswhentheteacherisnotphysicallypresent.Thecomputeristherebyused
toteachthepupil.Forexample,thecomputerpresentatopicjustlikeateacherdoes
inalesson.Pupilsareaskedquestions.Iftheyfail,thelessonisrepeated;o therwisea
new topic will be presented. CAL has the followingadvantages:
● This system allows pupilstostudyattheirownpace,repeatingsectionsthey
do not understand.
● Material is presented in a consistent way making learning easier.
● Few teachers are required.
● Computers are endlessly patient and can repeat sections that pupilsdidnot
understand without hesitation.
x ii. Used for typing and printing examination papers and keeping of student results.
Someschoolshavepupilswhoareeitherblindo rpartiallysighted.Computerscould
be used to help these pupils to learn in the following ways:
● Use of sound (voice) output and speech synthesiser.
● Use of speech (voice) input, recognition or microphones.
● Type using large characters (large font size) on the screen.
● Use of Braille keyboards, touch screens, touch pads.
● Use of bright colours to improve visibility.
● Use of scanners to input information and output speech.
● Use of printers which give output in Braille
Xiii: Electronic Registration (e-registration) of students
xiv. E-marking of student examinations
Compiled by: Kapondeni T. Cell:0772 245 866 Page160of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
i . Used for storage o f client account details like, account name, account number,
address, sex, date o f birth, national identification number, balance, withdrawal,
deposit, overdraft, interest, etc.
i i.Usedforc ashdisbursementattheAutomatedTellerMachine(ATM).AnATMis
a computerised, special purpose cash disbursement machine o utside banking halls
used even when banks are closed. Services offered at the ATM include:
● Balance enquiry,
● mini-bank statement,
● facility to change PIN code,
● cash withdrawal, etc
PIN (Personal Identification Number) - a secret number used by individual
account holders to access bank account and get service at the ATM. The account
holder needs a debit card for him/her to access bank services at the ATM.
The Account holder inserts the debit card into the hole o n the ATM, whichinturn
request the user’s PIN. The user enters the PIN and then presses enter. The ATM
validates thePIN,andifitiscorrect,allowstheusertoselectservicerequiredfrom
the list o f o ptions available. If the user enters the wrongPINforthreeconsecutive
attempts, the ATM would not eject the debit card, assuming that you are not the
owner of the card and no service shall be given.
i v. Electronic Funds Transfer at Point o f Sale (EFTPOS): This is a method o f
transferring money from o ne account to anotherelectronicallywithouthandlingo f
cashatthePointo fSaleterminalinshops.ThePointo fSaleterminalswillbeo nline
the bank’s database, enablingtheshoptodeductcashfromthecustomer’saccount
and transfer it totheshop’saccount.Forthistoo ccurthecustomerissupposedto
producethedebitcard,whichiswipedo nthecardreaderwhichinturnrequeststhe
client to enter the PIN. Some cash back is available at the POS.
Compiled by: Kapondeni T. Cell:0772 245 866 Page161of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
● D o not havetospendmoneyo ntravellingexpensestravellinglongdistances
to banks.
● No embarrassment of having to ask for loans face to face.
● Can do bank transactions even when banks are closed.
● Do not have to waste time waiting for a response to telephone banking.
hen purchasing the goods, the supermarkets and any o ther shops check the
W
following on the credit card:
● Check if the card is valid.
● Check if credit limit is not exceeded.
● Check if credit card is not reported as stolen.
● Check if expiry date has not been exceeded.
heintroductiono fATMs,EFTandelectronicbanking,includinginternetbankinghas
T
the following advantages and disadvantages.
Advantages to Bank workers
● Their workload is reduced, for instance the burden o f counting cash and
service many clients can be done the ATM.
● Reduction in mistakes, for instance counting cash and updating wrong
accounts as the computers validate details during entry.
● Reduction in working hours.
● Increased salaries.
● Better working conditions
Compiled by: Kapondeni T. Cell:0772 245 866 Page162of163 Date: 21-Oct-2020
‘O’ Level Computer Studies Notes-ZIMSEC Syllabus
C
● ustomers can lose money through credit card fraud.
● Customers may forget their PIN and fail to get service at ATM.
● Debit cards and credit cards can be stolen and used illegally thereby
customers will lose their money.
● Therearecaseso fphantomwithdrawals:unexplainedcashwithdrawalsfrom
bank accounts.
Compiled by: Kapondeni T. Cell:0772 245 866 Page163of163 Date: 21-Oct-2020